GetHandleVerifier
Static task
static1
Behavioral task
behavioral1
Sample
f56ebdb29ee67cbdb9ae04296ca72cb9119838741a144c22503c299745c646e4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f56ebdb29ee67cbdb9ae04296ca72cb9119838741a144c22503c299745c646e4.exe
Resource
win10v2004-20220812-en
General
-
Target
f56ebdb29ee67cbdb9ae04296ca72cb9119838741a144c22503c299745c646e4
-
Size
1.0MB
-
MD5
46308ffee743b85e2180f73dadb31100
-
SHA1
1c4368036b1fba4d77a08c3c7d50cdee225f829a
-
SHA256
f56ebdb29ee67cbdb9ae04296ca72cb9119838741a144c22503c299745c646e4
-
SHA512
f699834bd9dd6c4eb8d561aa3919e4a4a040000c59492f7adc3b2d33119037ceec80eb9071c696491fec3984dab3e8a9074f55abff9d99548a9c85d39f0546e0
-
SSDEEP
12288:tH6y2PbZkOrnhK0hOo0+wtGD9VmZYpmNvvtvlmuTfatbyUJiyLSios:tH6lPPrnhbhx8GD9V0YQ9vlvcJisz
Malware Config
Signatures
Files
-
f56ebdb29ee67cbdb9ae04296ca72cb9119838741a144c22503c299745c646e4.exe windows x86
4bfd7e0a37049645410489d5f732668b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ws2_32
ntohl
winmm
timeGetTime
shlwapi
UrlCanonicalizeW
SHStrDupW
advapi32
GetSidSubAuthority
GetSidSubAuthorityCount
RegEnumValueA
SystemFunction036
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
ConvertSidToStringSidW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegLoadKeyW
RegUnLoadKeyW
GetUserNameW
RegQueryValueExW
RegSetValueExW
GetFileSecurityW
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegCloseKey
CreateProcessAsUserW
GetTokenInformation
kernel32
EnumSystemLocalesW
HeapSize
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
GetTimeZoneInformation
WriteConsoleW
ReadConsoleW
OutputDebugStringW
GetDriveTypeW
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
GetModuleFileNameW
ExpandEnvironmentStringsW
CloseHandle
QueueUserAPC
TerminateProcess
ResumeThread
CreateProcessW
SetPriorityClass
GetPriorityClass
VirtualAllocEx
WriteProcessMemory
GetModuleHandleW
WaitForSingleObject
OpenProcess
GetFileInformationByHandle
GetExitCodeProcess
GetDateFormatW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
LockResource
SizeofResource
FindResourceW
CreateFileW
ReadFile
SetFilePointer
SetFileTime
WriteFile
VerSetConditionMask
GetShortPathNameW
VerifyVersionInfoW
GetFileAttributesW
GetFileAttributesExW
MoveFileExW
DuplicateHandle
GetCurrentThreadId
RemoveDirectoryW
GetSystemTimeAsFileTime
LocalFree
WTSGetActiveConsoleSessionId
LoadLibraryExW
CreateMutexW
GetTickCount
FormatMessageA
SetLastError
OutputDebugStringA
ReleaseMutex
DeleteFileW
GetCurrentProcessId
GetTempFileNameW
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
CopyFileW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
SetEnvironmentVariableA
SetCurrentDirectoryW
SetFileAttributesW
IsDebuggerPresent
GetNativeSystemInfo
GetVersionExW
GetCommandLineW
GetModuleHandleA
GetUserDefaultLangID
SetHandleInformation
GetHandleInformation
AssignProcessToJobObject
GetStdHandle
GetEnvironmentVariableW
FindFirstFileW
FindFirstFileExW
FindClose
FindNextFileW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetFileSizeEx
SetEnvironmentVariableW
QueryPerformanceCounter
FileTimeToSystemTime
QueryPerformanceFrequency
RtlCaptureStackBackTrace
GetLocaleInfoW
Sleep
CreateThread
LeaveCriticalSection
EnterCriticalSection
GetProcessId
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleExW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetEvent
ResetEvent
WaitForMultipleObjects
RtlCaptureContext
SetUnhandledExceptionFilter
InitializeCriticalSection
ReleaseSemaphore
VirtualQueryEx
CreateSemaphoreW
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetStartupInfoW
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
PeekNamedPipe
FileTimeToLocalFileTime
HeapReAlloc
GetProcessHeap
HeapAlloc
ExitProcess
GetFileType
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
HeapFree
IsProcessorFeaturePresent
GetStringTypeW
MultiByteToWideChar
EncodePointer
WideCharToMultiByte
LoadLibraryExA
CreateFileMappingW
GetUserDefaultUILanguage
ole32
PropVariantClear
CoSetProxyBlanket
CoCreateInstance
CLSIDFromString
CoUninitialize
CoAllowSetForegroundWindow
CoInitializeEx
CoTaskMemFree
StringFromGUID2
CoCreateGuid
oleaut32
SysFreeString
VariantInit
SysStringLen
VariantClear
SysAllocString
user32
LoadStringW
CharUpperW
LoadIconW
SetForegroundWindow
MoveWindow
DestroyWindow
CreateWindowExW
GetWindowThreadProcessId
FindWindowW
IsWindow
SendMessageTimeoutW
MessageBoxW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
SetWindowLongW
GetWindowLongW
SendMessageW
GetMonitorInfoW
MonitorFromWindow
urlmon
CreateURLMonikerEx
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Exports
Exports
Sections
.text Size: 549KB - Virtual size: 548KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 301KB - Virtual size: 301KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE