Static task
static1
Behavioral task
behavioral1
Sample
75fc41f0469f754a6fe42a24ff00e1b24dee18907ff0173f7a90092b5e083132.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75fc41f0469f754a6fe42a24ff00e1b24dee18907ff0173f7a90092b5e083132.exe
Resource
win10v2004-20220901-en
General
-
Target
75fc41f0469f754a6fe42a24ff00e1b24dee18907ff0173f7a90092b5e083132
-
Size
580KB
-
MD5
05518b99b8b1be51db6200438c668bf0
-
SHA1
9539972388b6f7e877f2144f84dc61b446ddbe63
-
SHA256
75fc41f0469f754a6fe42a24ff00e1b24dee18907ff0173f7a90092b5e083132
-
SHA512
841affd72fdbf200082e0949d1da4abfe7f55a8c7fdd4d9684950d118aa965327bea245bdc9b732575bdac09b0a9f220b2c3bdeb2a1974efb3ef5ff9cdaa088f
-
SSDEEP
12288:57MMMYMM8XERJMDiS/JTcSr+G30tkwdDn6G2d9ygQ6jnsO:54MMYMMgMJMDiqJY6hqCGYg6j
Malware Config
Signatures
Files
-
75fc41f0469f754a6fe42a24ff00e1b24dee18907ff0173f7a90092b5e083132.exe windows x64
fa9004a0c2db80200c505e2349a9bc4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
CheckTokenMembership
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterEventSourceW
ReportEventW
RegisterServiceCtrlHandlerW
DeregisterEventSource
ImpersonateLoggedOnUser
CreateProcessAsUserW
RevertToSelf
kernel32
HeapAlloc
GetProcessHeap
HeapFree
GetLastError
Sleep
CreateFileMappingW
MapViewOfFile
DuplicateHandle
GetCurrentProcess
UnmapViewOfFile
CloseHandle
GetSystemTimeAsFileTime
CompareStringW
CompareFileTime
K32EnumProcessModules
K32GetModuleInformation
K32GetModuleBaseNameW
lstrcmpW
GetCurrentProcessId
OpenProcess
K32GetModuleFileNameExW
SetLastError
GetTickCount
GetCurrentThreadId
GetModuleHandleW
FormatMessageW
LocalFree
CreateEventW
FreeLibrary
GetProcAddress
LoadLibraryExA
DelayLoadFailureHook
HeapSetInformation
lstrlenW
TerminateProcess
GetStartupInfoW
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
gdi32
CreateSolidBrush
user32
GetWindowThreadProcessId
PostMessageW
GetWindow
RegisterWindowMessageW
SetWindowLongPtrW
RegisterShellHookWindow
SetTimer
EnumWindows
PostQuitMessage
GetLastInputInfo
IsWindow
DestroyWindow
MoveWindow
GetSystemMetrics
KillTimer
DefWindowProcW
LoadCursorW
RegisterClassW
CreateWindowExW
GetWindowTextW
SystemParametersInfoW
SetShellWindow
GetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
GetMessageW
DispatchMessageW
UnregisterClassW
LoadStringW
LoadIconW
DestroyIcon
FlashWindowEx
GetWindowRect
GetWindowInfo
GetClassNameW
GetClassLongPtrW
GetWindowLongPtrW
FindWindowW
ShowWindow
GetWindowTextLengthW
SendMessageW
GetClassLongW
SetTaskmanWindow
msvcrt
_vsnwprintf
wcsrchr
_atoi64
__getmainargs
__C_specific_handler
_exit
_ismbblead
_cexit
memset
exit
?terminate@@YAXXZ
__set_app_type
_fmode
__setusermatherr
_commode
_amsg_exit
_initterm
_XcptFilter
_acmdln
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
WinSqmAddToAverageDWORD
WinSqmIncrementDWORD
WinSqmAddToStream
WinSqmEndSession
WinSqmSetDWORD
WinSqmSetString
WinSqmStartSession
WinSqmIsOptedIn
RtlFreeSid
RtlAllocateAndInitializeSid
RtlCaptureContext
wtsapi32
WTSDisconnectSession
WTSRegisterSessionNotification
WTSUnRegisterSessionNotification
WTSQueryUserToken
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
winsta
WinStationRevertFromServicesSession
WinStationSwitchToServicesSession
WinStationGetSessionIds
shell32
SHGetFolderPathW
shlwapi
ord354
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp1 Size: 540KB - Virtual size: 1.8MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE