Static task
static1
Behavioral task
behavioral1
Sample
ddb7d2ab2af7b0d276600451aa17495647733ce2ceef93d6d68806e3493e5021.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ddb7d2ab2af7b0d276600451aa17495647733ce2ceef93d6d68806e3493e5021.exe
Resource
win10v2004-20220901-en
General
-
Target
ddb7d2ab2af7b0d276600451aa17495647733ce2ceef93d6d68806e3493e5021
-
Size
133KB
-
MD5
0d0f726116ffd890ff01d2486b8ed5c0
-
SHA1
68fab52b3411b25df7e4f1eb500dc119eada2c90
-
SHA256
ddb7d2ab2af7b0d276600451aa17495647733ce2ceef93d6d68806e3493e5021
-
SHA512
83ed95beb3a0237b5f2b01943726c0b3d83f5501180b7195ebfa7ae709494a9d771cfcf027f8d66fd1bd134eb2cfb934706359c5265c3af6e2727d5c89f5280b
-
SSDEEP
3072:rujuVgwYsAp6wXhZIStIyyzdxx3N/LCyvy9Nl+6q:rujpwYXUwEAyx/NK+7
Malware Config
Signatures
Files
-
ddb7d2ab2af7b0d276600451aa17495647733ce2ceef93d6d68806e3493e5021.exe windows x86
205aeb3f447d4abc4db53c705847d3e0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
CreateProcessA
CopyFileA
SetPriorityClass
FreeLibrary
GetProcAddress
GlobalMemoryStatus
GetShortPathNameA
ExitProcess
GetLastError
SetErrorMode
WriteFile
ReadFile
WinExec
GetSystemInfo
GetTickCount
lstrcpyA
lstrcatA
CreateMutexA
LoadLibraryA
DeleteFileA
GetVersionExA
CreateFileW
HeapSize
WaitForSingleObject
ResumeThread
SetThreadPriority
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
WideCharToMultiByte
CloseHandle
LCMapStringW
GetStringTypeW
WriteConsoleW
ReadConsoleW
SetStdHandle
OutputDebugStringW
SetFilePointerEx
LoadLibraryExW
SetEndOfFile
HeapReAlloc
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
Sleep
GetEnvironmentVariableA
CreateThread
CreateDirectoryW
GetCPInfo
GetOEMCP
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
RtlUnwind
GetSystemTimeAsFileTime
GetCommandLineA
EncodePointer
DecodePointer
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
DeleteCriticalSection
HeapFree
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
GetStdHandle
GetFileType
GetModuleFileNameW
GetProcessHeap
GetConsoleCP
GetConsoleMode
IsValidCodePage
GetACP
user32
wsprintfA
advapi32
CheckTokenMembership
AdjustTokenPrivileges
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
OpenProcessToken
GetUserNameA
LookupPrivilegeValueA
FreeSid
AllocateAndInitializeSid
ws2_32
select
recv
inet_ntoa
WSASocketA
WSAGetLastError
WSACleanup
WSAStartup
gethostname
WSAIoctl
socket
setsockopt
sendto
send
ntohl
inet_addr
htons
htonl
connect
closesocket
gethostbyname
__WSAFDIsSet
dnsapi
DnsFree
DnsQuery_A
shlwapi
PathRemoveFileSpecA
PathFindFileNameA
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE