Static task
static1
Behavioral task
behavioral1
Sample
4076c38c4c643a1107f43c819727eb868ab298f928a2dcabfd4531a9207874d5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4076c38c4c643a1107f43c819727eb868ab298f928a2dcabfd4531a9207874d5.exe
Resource
win10v2004-20220812-en
General
-
Target
4076c38c4c643a1107f43c819727eb868ab298f928a2dcabfd4531a9207874d5
-
Size
66KB
-
MD5
0d841e95396fc813f0ffeb9624d563d0
-
SHA1
7479a7094780659f5ada9b90588f004d193f3e1a
-
SHA256
4076c38c4c643a1107f43c819727eb868ab298f928a2dcabfd4531a9207874d5
-
SHA512
dfbcff4c31a58cc6235dc705b6ed372cef06ec55e2e908f94387857485a125ef9b011a1fa3ddf93df25635956d6f9b70948dab63552b07fece3c7351ae1eec49
-
SSDEEP
768:fiDThiVWy0djKfGCrjd7k8/KQlR3w0yhEzKIvsVNRNF01GyRV6e2Gu/mhh8Y0WxF:fiPvjKzjZk8S0RgOzKvNiRPtu+hAmdp
Malware Config
Signatures
Files
-
4076c38c4c643a1107f43c819727eb868ab298f928a2dcabfd4531a9207874d5.exe windows x86
22d602c3d8e6f25ecb33fde5f8427bd0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
AuditFree
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
LookupAccountNameW
ConvertStringSidToSidW
AuditLookupSubCategoryNameW
AuditEnumerateSubCategories
AuditLookupCategoryNameW
AuditEnumerateCategories
ConvertSecurityDescriptorToStringSecurityDescriptorW
AuditQuerySecurity
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
AuditSetSecurity
RegSetValueExW
LsaFreeMemory
LsaClose
LsaLookupSids
LsaNtStatusToWinError
LsaOpenPolicy
AuditEnumeratePerUserPolicy
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
AuditQueryGlobalSaclW
AuditSetGlobalSaclW
AuditQuerySystemPolicy
AuditQueryPerUserPolicy
AuditSetSystemPolicy
AuditSetPerUserPolicy
GetSecurityDescriptorSacl
EqualSid
DeleteAce
GetAce
GetAclInformation
LookupAccountSidW
kernel32
CompareStringW
GetConsoleOutputCP
SetThreadPreferredUILanguages
HeapSetInformation
LocalFree
CloseHandle
GetLastError
GetCurrentProcess
GetComputerNameW
FormatMessageW
LocalAlloc
CreateFileW
DeleteFileW
WriteFile
WideCharToMultiByte
WriteConsoleW
GetStdHandle
VirtualAlloc
VirtualProtect
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetVersion
msvcrt
ferror
feof
fgetws
_wfopen
wscanf
qsort
vfwprintf
_vsnwprintf_s
_wtoi
free
_callnewh
malloc
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_except_handler4_common
_controlfp
fclose
_purecall
memset
wcschr
??0exception@@QAE@XZ
__CxxFrameHandler3
wprintf
_CxxThrowException
memcpy
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
memmove_s
memcpy_s
_wcsnicmp
_wcsicmp
_wsetlocale
_iob
_vsnwprintf
??0exception@@QAE@ABQBD@Z
ntdll
RtlCompareMemory
RtlGUIDFromString
RtlNtStatusToDosError
RtlFreeHeap
RtlAllocateHeap
RtlImageNtHeader
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE