Static task
static1
Behavioral task
behavioral1
Sample
d07bd0b8774140f23d1b903cbc59d49149f396de5a0324823e675f4bf2c1f735.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d07bd0b8774140f23d1b903cbc59d49149f396de5a0324823e675f4bf2c1f735.exe
Resource
win10v2004-20220812-en
General
-
Target
d07bd0b8774140f23d1b903cbc59d49149f396de5a0324823e675f4bf2c1f735
-
Size
78KB
-
MD5
03eb73ba1749eb007f76eecbf5a34c20
-
SHA1
a94501e1321af4878fda07f1b2175d7f8920f5b6
-
SHA256
d07bd0b8774140f23d1b903cbc59d49149f396de5a0324823e675f4bf2c1f735
-
SHA512
bd4a6b2b13a143348314f305c12979994fbc8cc7f797387935fbaa24c3cd091f3fcacf859860a8487983e162496a696e04f8c40df4cbb9c26c57e2991ae5edb7
-
SSDEEP
1536:o4ShV1bEIMAeRLRjEvg4h2g8wAxWVPnFrUQiWjmrhYCqEx:oHbE/AILRjEvb9ZVPnFUQZjmrKG
Malware Config
Signatures
Files
-
d07bd0b8774140f23d1b903cbc59d49149f396de5a0324823e675f4bf2c1f735.exe windows x86
8b48f8e518a643cd2b45d82df0c25a26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegConnectRegistryW
RegSetValueExW
LookupAccountSidW
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
kernel32
CompareStringW
GetComputerNameW
VirtualQuery
VirtualAlloc
VirtualFree
FindClose
FindFirstFileW
GetVolumeInformationW
GetDriveTypeW
GetSystemDirectoryW
GetLogicalDrives
GetConsoleScreenBufferInfo
GetStdHandle
CloseHandle
OpenProcess
GetCurrentProcess
GetTimeFormatW
SetThreadUILanguage
FileTimeToSystemTime
GetModuleFileNameW
SetConsoleMode
ReadFile
ReadConsoleW
WriteConsoleW
ExitProcess
GetConsoleOutputCP
HeapReAlloc
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
CompareStringA
GetThreadLocale
lstrlenW
lstrlenA
GetFileType
GetConsoleMode
VerifyVersionInfoW
FormatMessageW
LocalFree
UnhandledExceptionFilter
TerminateProcess
GetLastError
SetLastError
GetComputerNameExW
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
msvcrt
__iob_func
wcstod
wcstol
__p__commode
fprintf
_controlfp
_except_handler4_common
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
wcstok
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??2@YAPAXI@Z
??3@YAXPAX@Z
_wgetcwd
??_U@YAPAXI@Z
wcstoul
_CxxThrowException
??_V@YAXPAX@Z
__CxxFrameHandler3
_vsnwprintf
memset
_iob
_memicmp
_get_osfhandle
_errno
_fileno
fflush
user32
CharUpperW
LoadStringW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetAddConnection2W
netapi32
NetFileClose
NetFileEnum
NetApiBufferFree
NetServerGetInfo
secur32
GetUserNameExW
ws2_32
WSAGetLastError
WSAStartup
FreeAddrInfoW
GetNameInfoW
WSACleanup
WSALookupServiceBeginW
WSALookupServiceNextW
WSALookupServiceEnd
GetAddrInfoW
framedynos
?Find@CHString@@QBEHPBG@Z
??1CHString@@QAE@XZ
??4CHString@@QAEABV0@PBG@Z
??0CHString@@QAE@XZ
??4CHString@@QAEABV0@ABV0@@Z
?Mid@CHString@@QBE?AV1@H@Z
??YCHString@@QAEABV0@PBG@Z
?Right@CHString@@QBE?AV1@H@Z
?GetData@CHString@@IBEPAUCHStringData@@XZ
?Format@CHString@@QAAXPBGZZ
??0CHString@@QAE@PBG@Z
?Left@CHString@@QBE?AV1@H@Z
?Mid@CHString@@QBE?AV1@HH@Z
ntdll
NtQuerySystemInformation
RtlAllocateHeap
VerSetConditionMask
RtlInitUnicodeString
shlwapi
StrStrIW
StrChrW
StrChrIW
StrStrW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE