Static task
static1
Behavioral task
behavioral1
Sample
57fde4cbdad339f707a3d4aaa54803479cb117e791848cb990a953e360773443.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57fde4cbdad339f707a3d4aaa54803479cb117e791848cb990a953e360773443.exe
Resource
win10v2004-20220812-en
General
-
Target
57fde4cbdad339f707a3d4aaa54803479cb117e791848cb990a953e360773443
-
Size
524KB
-
MD5
085d31b915a58dd9502f19a8abf98140
-
SHA1
4eea906072f420d753e987589e6a05995e787583
-
SHA256
57fde4cbdad339f707a3d4aaa54803479cb117e791848cb990a953e360773443
-
SHA512
82580dbf7007360c0ce766228a2428a407b0c50dd4c9e1ef5e24da43c87df96152c7b545cd7dbb184dd90a232d479b0e73ac72fdb67a1988e516d65f7f3bd14a
-
SSDEEP
12288:JHjTNQaObXAxBAfvD0rPxPYjRFV4ANjovEz0RvskNqk:J+gqfv+xPYPiATz0ZskN
Malware Config
Signatures
Files
-
57fde4cbdad339f707a3d4aaa54803479cb117e791848cb990a953e360773443.exe windows x64
523ea4765920771cdb0198b89684f185
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
OpenProcessToken
TraceMessage
GetTokenInformation
GetTraceEnableFlags
CreateProcessAsUserW
GetTraceLoggerHandle
LookupAccountSidW
UnregisterTraceGuids
GetTraceEnableLevel
RegisterTraceGuidsW
kernel32
GetCurrentProcess
GetSystemWindowsDirectoryW
WaitForSingleObjectEx
WriteFile
Sleep
ReadFile
CreateFileW
GetOverlappedResult
GetLastError
ResetEvent
CreateEventW
SetNamedPipeHandleState
HeapSetInformation
CloseHandle
QueryPerformanceCounter
GetTickCount
GetModuleHandleW
SetUnhandledExceptionFilter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
msvcrt
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
memset
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
wprintf
__wgetmainargs
memcpy
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlAllocateHeap
RtlFreeHeap
RtlCaptureContext
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 508KB - Virtual size: 1.8MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE