Static task
static1
Behavioral task
behavioral1
Sample
d1607ca2552e4c960fa9de3b1012be358856b31a39d816f9540bf6bf8c4bf0c5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d1607ca2552e4c960fa9de3b1012be358856b31a39d816f9540bf6bf8c4bf0c5.exe
Resource
win10v2004-20220812-en
General
-
Target
d1607ca2552e4c960fa9de3b1012be358856b31a39d816f9540bf6bf8c4bf0c5
-
Size
72KB
-
MD5
0d1c609e2399e9df6fc1e935f6b8c4a0
-
SHA1
2112cf942672457c2a90d8bab396cb1a6732c531
-
SHA256
d1607ca2552e4c960fa9de3b1012be358856b31a39d816f9540bf6bf8c4bf0c5
-
SHA512
7cc1437787bda989c1ff26e11977f1b56e5e6bb00125f7bfb2843d645605a3523a25bbe9b8792faf5ef9dd777d92f087bed547da95308e11a20001df9e86d3dd
-
SSDEEP
1536:/MgrKVZ+ZPf0awZh101RSJh6b8xvZDA9bHcw5Hs8XquQvRh6:RK7MsawrJh6b8lZDo8w5Hs8Xryo
Malware Config
Signatures
Files
-
d1607ca2552e4c960fa9de3b1012be358856b31a39d816f9540bf6bf8c4bf0c5.exe windows x86
45bdd932e986574a74f62f595b7078b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
SymUnDName
SymSetOptions
SymInitialize
SymGetModuleBase
SymFunctionTableAccess
StackWalk
SymGetModuleInfo
SymCleanup
SymGetSymFromAddr
sqlunirl
_GetUnicodeRedirectionLayer@0
_GetVersionEx@4
_FormatMessage@28
_LoadString@16
_GetProcAddress_@8
atl
ord30
ord23
ord21
ord22
ord18
ord20
ord17
ord16
ord58
ord32
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
WriteFile
CloseHandle
FlushFileBuffers
ReadProcessMemory
HeapFree
lstrlenA
HeapAlloc
GetProcessHeap
GetCurrentProcess
Sleep
SetErrorMode
GetEnvironmentVariableA
GetModuleFileNameA
QueryPerformanceFrequency
GlobalMemoryStatus
GetVersionExA
GetSystemInfo
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FreeLibrary
GetModuleHandleA
LoadLibraryA
lstrcatA
FormatMessageA
GetLastError
GetSystemDefaultLangID
GetSystemDefaultLCID
lstrcpyA
ExpandEnvironmentStringsA
WideCharToMultiByte
ResetEvent
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEvent
InterlockedIncrement
InterlockedDecrement
GetStdHandle
WaitForSingleObject
WaitForMultipleObjects
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
AllocConsole
CreateFileA
CreateEventA
GetCommandLineA
SetFilePointer
GetCurrentThreadId
user32
MessageBoxA
wsprintfA
advapi32
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
MakeSelfRelativeSD
GetSecurityDescriptorLength
OpenProcessToken
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetLengthSid
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
oleaut32
LoadRegTypeLi
SysFreeString
SysStringLen
msvcrt
wcslen
_stricmp
asctime
localtime
__p___initenv
exit
_XcptFilter
_iob
freopen
printf
fclose
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_exit
wcscpy
strncpy
malloc
??3@YAXPAX@Z
wprintf
_except_handler3
sprintf
_strnicmp
strchr
_purecall
time
wcsncat
wcsncpy
wcschr
??2@YAPAXI@Z
free
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE