Static task
static1
Behavioral task
behavioral1
Sample
247ea614360dfdc41224075f17afbb32f826075a68ca77a299d147cf44b92c39.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
247ea614360dfdc41224075f17afbb32f826075a68ca77a299d147cf44b92c39.exe
Resource
win10v2004-20220812-en
General
-
Target
247ea614360dfdc41224075f17afbb32f826075a68ca77a299d147cf44b92c39
-
Size
56KB
-
MD5
0f7fb7b2ca21347cef38e2a1a8d60ba2
-
SHA1
c7ec4cafdf9b371effad286d985f77c23967fa1a
-
SHA256
247ea614360dfdc41224075f17afbb32f826075a68ca77a299d147cf44b92c39
-
SHA512
49966949e7943c5f773366b5996c08316ba11f3c1e91b0e29d144e5d7fbb1889682eafcd0b5219036f2ebb06c7c88ba64d597ad8765621337c0f5e84763dfb8e
-
SSDEEP
1536:5XNfiwaCXkR4eRclUw1yAXYGKRKvP81w7L4:5SiHlPwkjL
Malware Config
Signatures
Files
-
247ea614360dfdc41224075f17afbb32f826075a68ca77a299d147cf44b92c39.exe windows x86
a2888c1c669df960fa9bf31a11ecc7ab
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
TraceMessage
kernel32
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
InterlockedDecrement
InterlockedIncrement
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetVersion
GetLastError
WaitForSingleObject
CreateEventW
CreateProcessW
SetEvent
CompareStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
HeapDestroy
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
user32
SendMessageW
FindWindowW
UnregisterClassA
msvcrt
_ismbblead
??3@YAXPAX@Z
memset
_vsnwprintf
memcpy_s
_CxxThrowException
_wcsicmp
_vscwprintf
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_controlfp
_XcptFilter
_exit
_cexit
__getmainargs
free
??_U@YAPAXI@Z
??_V@YAXPAX@Z
wcschr
??2@YAPAXI@Z
__CxxFrameHandler3
wcstok
memmove_s
vswprintf_s
oleaut32
SysAllocString
SysFreeString
shlwapi
StrRStrIW
ole32
CreateBindCtx
CoRegisterClassObject
CLSIDFromString
CoUninitialize
CoInitializeEx
CoCreateInstance
CoRevokeClassObject
setupapi
SetupDiOpenDevRegKey
SetupDiOpenDeviceInterfaceW
SetupDiGetClassDevsExW
SetupDiGetDeviceInterfaceAlias
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
shell32
ord155
ShellExecuteExW
SHParseDisplayName
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jplpgop Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE