Static task
static1
Behavioral task
behavioral1
Sample
ff43855863b8fdc56bd15db3da11a2fcff56dfea53753bfab7ce05f9398fb807.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ff43855863b8fdc56bd15db3da11a2fcff56dfea53753bfab7ce05f9398fb807.exe
Resource
win10v2004-20220901-en
General
-
Target
ff43855863b8fdc56bd15db3da11a2fcff56dfea53753bfab7ce05f9398fb807
-
Size
108KB
-
MD5
07ea358ed98e09fdb1d641b59d925420
-
SHA1
9fade3245c2246d4834a4d6e41ecfe43393b3838
-
SHA256
ff43855863b8fdc56bd15db3da11a2fcff56dfea53753bfab7ce05f9398fb807
-
SHA512
c8423b88ad2475585d7e65cedefdb5efa1d32232e8b1b6c11c34867d6c0539c527c88aa68014ed6695478575bfd51c7ac454cd74fc1f20a9c2a1535f96570bec
-
SSDEEP
3072:p7fYqL8Y2b+X1FL/Mea8SPN05TnzT/LWA:IYHX1hSS5DV
Malware Config
Signatures
Files
-
ff43855863b8fdc56bd15db3da11a2fcff56dfea53753bfab7ce05f9398fb807.exe windows x86
ea642d8cbc343135077188bff92863e2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
OpenThreadToken
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
SetSecurityDescriptorGroup
GetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetSecurityDescriptorOwner
InitializeSecurityDescriptor
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
kernel32
GetCurrentProcess
GetLastError
GetCurrentThread
SystemTimeToFileTime
GetFullPathNameW
GetCurrentDirectoryW
GlobalLock
GetProcessHeap
GlobalFree
GlobalUnlock
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceW
ReadConsoleW
MultiByteToWideChar
GetFileType
ReadFile
SetConsoleMode
GetConsoleMode
GetStdHandle
LocalFree
SetFilePointerEx
CreateFileW
HeapSetInformation
InterlockedExchange
HeapFree
HeapAlloc
CloseHandle
GlobalAlloc
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
GetVersionExW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
SetLastError
FindResourceExW
FindFirstFileW
FindNextFileW
FindClose
LoadLibraryW
FreeLibrary
FormatMessageW
WriteFile
WriteConsoleW
GetConsoleOutputCP
SetThreadUILanguage
GetConsoleScreenBufferInfo
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
GetLocaleInfoW
GetModuleFileNameW
ExpandEnvironmentStringsW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
Sleep
msvcrt
_vsnwprintf
_wcsicmp
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
qsort
_wtoi
towlower
wcsstr
wcschr
_wfopen
_errno
fgetws
ferror
wcsrchr
fseek
fclose
_getmbcp
wprintf
memset
iswspace
_wmakepath_s
_wsplitpath_s
wcsncmp
_wcsnicmp
bsearch
memcpy
wcstok
isspace
user32
LoadStringW
CharToOemW
ole32
CoInitializeEx
CoUninitialize
CoInitializeSecurity
CoCreateInstance
CreateStreamOnHGlobal
StringFromGUID2
oleaut32
VarDateFromStr
VariantTimeToSystemTime
VariantClear
VariantInit
SystemTimeToVariantTime
SafeArrayDestroy
SafeArrayUnaccessData
SysAllocString
SafeArrayAccessData
SafeArrayCreateVector
SysFreeString
VariantChangeType
VarBstrFromDate
shlwapi
PathIsNetworkPathW
secur32
GetUserNameExW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ntdll
NtOpenProcessToken
NtClose
NtQueryInformationToken
NtOpenThreadToken
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xplzsao Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE