Static task
static1
Behavioral task
behavioral1
Sample
4bdc7b3e96a20399b90c07d4770f391646bba40068d544f66263c8fbeeba1046.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4bdc7b3e96a20399b90c07d4770f391646bba40068d544f66263c8fbeeba1046.exe
Resource
win10v2004-20220812-en
General
-
Target
4bdc7b3e96a20399b90c07d4770f391646bba40068d544f66263c8fbeeba1046
-
Size
106KB
-
MD5
0c5ad7e16266e14fe35779a33e58bea0
-
SHA1
663de9cb7226c93abeb73cab02760d64f6dbd175
-
SHA256
4bdc7b3e96a20399b90c07d4770f391646bba40068d544f66263c8fbeeba1046
-
SHA512
61ae839c6d2274ff260234401086f363bf39adc58c2824870ce942f3510c5aabdfa6f249a0ccb1c6a1c6106868081e9d64d44a3bfa3bbf2a857a0c1906c3a372
-
SSDEEP
3072:JIakjsLP7sna4jz+W8hyL11kiuinAFoHLx9q/yGOn:JIa4ETsVzB8hM1/uoHLxs/
Malware Config
Signatures
Files
-
4bdc7b3e96a20399b90c07d4770f391646bba40068d544f66263c8fbeeba1046.exe windows x86
46eadabb113b23802a8a5a26c113324a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegConnectRegistryW
CheckTokenMembership
AllocateAndInitializeSid
FreeSid
kernel32
CloseHandle
GetFileSize
CreateFileW
WritePrivateProfileStringW
SetFileAttributesW
GetFileAttributesW
GetLastError
WritePrivateProfileSectionW
HeapSetInformation
GetTimeFormatW
GetComputerNameExW
GetModuleFileNameW
FileTimeToSystemTime
SetConsoleMode
ReadFile
ReadConsoleW
WriteConsoleW
ExitProcess
GetConsoleOutputCP
HeapReAlloc
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
CompareStringA
GetThreadLocale
CompareStringW
GetPrivateProfileSectionW
lstrlenA
GetFileType
GetStdHandle
GetConsoleMode
VerSetConditionMask
VerifyVersionInfoW
FormatMessageW
LocalFree
SetThreadUILanguage
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetLastError
GetPrivateProfileStringW
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
lstrlenW
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
wcschr
_ltow
wcsstr
_itow
wcsrchr
_wfopen
fclose
_wchmod
wcsncpy_s
memset
wcstok
__iob_func
_vsnwprintf
_memicmp
_get_osfhandle
_errno
_fileno
fflush
fprintf
wcstod
wcstoul
wcstol
user32
CharUpperW
CharLowerW
LoadStringW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetAddConnection2W
netapi32
NetApiBufferFree
NetServerGetInfo
ws2_32
FreeAddrInfoW
WSACleanup
GetAddrInfoW
WSAStartup
WSAGetLastError
GetNameInfoW
secur32
GetUserNameExW
shlwapi
StrStrIW
StrCmpNW
StrRChrW
StrChrW
StrChrIW
StrStrW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE