Static task
static1
Behavioral task
behavioral1
Sample
5807872562c2440896614af1c07eca17782e5afd7466e8fb84251bd58dff7a4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5807872562c2440896614af1c07eca17782e5afd7466e8fb84251bd58dff7a4a.exe
Resource
win10v2004-20220812-en
General
-
Target
5807872562c2440896614af1c07eca17782e5afd7466e8fb84251bd58dff7a4a
-
Size
610KB
-
MD5
0e1d9d08850ea2132fb4b740a6ef7770
-
SHA1
717f2e05d6e46f5c2006172cda0e5b0fabe0bf8b
-
SHA256
5807872562c2440896614af1c07eca17782e5afd7466e8fb84251bd58dff7a4a
-
SHA512
ebe42acd44530b4fa49a9d6b95ad36a501e28c48bbdd153c76a518cb179141f4393f82a5be0939af5e32095976144b2db2ecee093fa1e3d4bc132ce80b18a320
-
SSDEEP
12288:K6l4gwBTRmhl1x/+uLbN6g4gYIWHGtA6G5:52RBTRmj1xWupYrGtA6G
Malware Config
Signatures
Files
-
5807872562c2440896614af1c07eca17782e5afd7466e8fb84251bd58dff7a4a.exe windows x64
9520936866bbbf091d0664003aa711d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FindResourceExW
GetModuleFileNameA
EndUpdateResourceW
LocalFree
GetFileInformationByHandle
GetLocalTime
CreateDirectoryA
MultiByteToWideChar
WriteFile
GetWindowsDirectoryA
CreateThread
CloseHandle
DeviceIoControl
CreateEventW
CreateFileMappingW
GetProcAddress
SetLastError
GetLastError
GetFileSizeEx
GetTempPathW
CreateFileW
LoadResource
GetFileAttributesW
LoadLibraryW
WideCharToMultiByte
SetEvent
WaitForSingleObject
CreateDirectoryW
MoveFileExW
FreeLibrary
UnmapViewOfFile
MapViewOfFile
GetTempFileNameW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
OutputDebugStringA
GetStartupInfoW
SizeofResource
LockResource
GetCommandLineW
UpdateResourceW
BeginUpdateResourceA
CreateFileA
Sleep
VirtualProtect
GetModuleHandleW
GetModuleFileNameW
msvcrt
_snprintf
?terminate@@YAXXZ
memmove
memset
memcpy
??1type_info@@UEAA@XZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
__setusermatherr
_amsg_exit
_initterm
_acmdln
_cexit
_ismbblead
_exit
ferror
__C_specific_handler
__getmainargs
_callnewh
malloc
free
??0exception@@QEAA@AEBQEBDH@Z
_CxxThrowException
_strlwr
_errno
__CxxFrameHandler
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
_commode
_strdup
sprintf
strncpy
_vsnprintf
time
_purecall
fopen
fclose
ftell
fread
realloc
_XcptFilter
exit
printf
rewind
fseek
shell32
CommandLineToArgvW
SHGetFolderPathW
advapi32
GetSecurityInfo
SetSecurityInfo
SetEntriesInAclW
ConvertStringSidToSidW
mpr
WNetGetConnectionW
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 556KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE