Static task
static1
Behavioral task
behavioral1
Sample
9678058163c68b8f19e0b0721705afe73ca4eccc52122273f38b8397ef4be275.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9678058163c68b8f19e0b0721705afe73ca4eccc52122273f38b8397ef4be275.exe
Resource
win10v2004-20220812-en
General
-
Target
9678058163c68b8f19e0b0721705afe73ca4eccc52122273f38b8397ef4be275
-
Size
105KB
-
MD5
0cca20037c0f4653fd25708c0f346e90
-
SHA1
5aa65f6c63f0c0635ab0068df1b408a463498e06
-
SHA256
9678058163c68b8f19e0b0721705afe73ca4eccc52122273f38b8397ef4be275
-
SHA512
d49b6a201e4c7dbff97f529bd8c4c028cee878a96954fa08c8fd6280e0318aace1aa456b0d7e098ea68d1c0f6152c16ec225b9f3671ced34eecf90cdc9689199
-
SSDEEP
3072:80GEs9Mu1MYKab5yrZ2XQXTTd5H9XTm7ku:xGEUM+MYKab5mZoQD55H52
Malware Config
Signatures
Files
-
9678058163c68b8f19e0b0721705afe73ca4eccc52122273f38b8397ef4be275.exe windows x86
e631a9f0f3f3e19ca1bb8a9ce43034b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
OpenThreadToken
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
EqualSid
SetSecurityDescriptorDacl
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
InitializeSecurityDescriptor
kernel32
HeapSize
GetVersionExA
GetEnvironmentVariableW
LocalAlloc
DeviceIoControl
HeapDestroy
HeapCreate
GetCommandLineW
LocalFree
GetFileAttributesW
LoadLibraryW
FreeLibrary
ExpandEnvironmentStringsW
GetLastError
GetModuleHandleW
GetProcAddress
GetCurrentProcess
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
HeapFree
VirtualQuery
MapViewOfFile
CreateFileMappingW
GetFileSize
UnmapViewOfFile
TlsAlloc
GetLocalTime
TlsSetValue
HeapReAlloc
HeapAlloc
TlsGetValue
GetTempFileNameW
GetWindowsDirectoryW
GetTempPathW
SetLastError
FormatMessageW
RaiseException
ExitProcess
TlsFree
GetWindowsDirectoryA
CloseHandle
GetCurrentThread
ReleaseMutex
WaitForSingleObject
SetFilePointer
WriteFile
GetModuleFileNameA
CreateMutexW
CreateFileW
GetModuleFileNameW
DeleteFileW
GetVersion
GetSystemInfo
CreateMutexA
CreateFileMappingA
CreateFileA
DeleteFileA
LoadLibraryA
ExpandEnvironmentStringsA
GetFileSizeEx
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringA
IsDebuggerPresent
msvcrt
fclose
??1type_info@@UAE@XZ
malloc
wcstok
_wtoi
swscanf_s
iswctype
memcpy
_purecall
wcsrchr
towlower
__CxxFrameHandler3
memset
??3@YAXPAX@Z
_vsnwprintf
_wcsnicmp
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_unlock
__dllonexit
_lock
_onexit
free
??2@YAPAXI@Z
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_wcsicmp
_wfopen
fgetws
_vsnprintf
feof
shell32
CommandLineToArgvW
ord165
shlwapi
PathCombineW
user32
UnregisterClassA
dbghelp
MiniDumpWriteDump
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE