Static task
static1
Behavioral task
behavioral1
Sample
eef84a67551647c73fbb612638f867757e22a691d85b4b408f0b1ca3ec633951.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eef84a67551647c73fbb612638f867757e22a691d85b4b408f0b1ca3ec633951.exe
Resource
win10v2004-20220812-en
General
-
Target
eef84a67551647c73fbb612638f867757e22a691d85b4b408f0b1ca3ec633951
-
Size
371KB
-
MD5
08ffc80b4e9e0698f42c9720c2558ff0
-
SHA1
00ab37f70b69e18365c79f54cbf01a890b593932
-
SHA256
eef84a67551647c73fbb612638f867757e22a691d85b4b408f0b1ca3ec633951
-
SHA512
2787af5cda9f8c6a3f536b35852b068adceca454fc8a3f8744288f102003b12468f29ea67636281123ccc256430a258e0e194811eab6f5d99b88d74431c2d2ba
-
SSDEEP
6144:dmyNQ66YN0IkK5V4zua8OUzP6yUWHZOdSuKg/DqoVt137I:dm8B9DVSD85ZUWHISuKOt137I
Malware Config
Signatures
Files
-
eef84a67551647c73fbb612638f867757e22a691d85b4b408f0b1ca3ec633951.exe windows x64
f6bca218e4add837a16519a7dc44c311
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegSetValueExW
kernel32
FindFirstFileW
FreeLibrary
CreateProcessW
LoadLibraryExW
WaitForSingleObject
GetSystemDirectoryW
WideCharToMultiByte
Sleep
GetModuleFileNameW
lstrlenW
GetLastError
GetProcAddress
FindNextFileW
CloseHandle
GetWindowsDirectoryW
DeleteFileW
lstrcpyW
SetEndOfFile
CreateFileW
CreateFileA
GetLocaleInfoW
ReadFile
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlCaptureContext
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetCPInfo
RtlLookupFunctionEntry
RtlUnwindEx
RaiseException
RtlPcToFileHeader
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetModuleHandleA
ExitProcess
RtlVirtualUnwind
HeapSetInformation
HeapCreate
FlsGetValue
FlsSetValue
TlsFree
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
SetFilePointer
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapReAlloc
LoadLibraryA
user32
MessageBoxW
shell32
SHFileOperationW
SHGetFolderPathW
SHGetSpecialFolderPathW
ole32
OleUninitialize
CoInitialize
OleInitialize
CoUninitialize
CoCreateInstance
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE