Static task
static1
Behavioral task
behavioral1
Sample
b14c6515cdd01d13676b83d18c312949844c7e7bccd80382e9aed6361d340d74.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b14c6515cdd01d13676b83d18c312949844c7e7bccd80382e9aed6361d340d74.exe
Resource
win10v2004-20220812-en
General
-
Target
b14c6515cdd01d13676b83d18c312949844c7e7bccd80382e9aed6361d340d74
-
Size
553KB
-
MD5
3094a68ed4d74420463619d3ab968c41
-
SHA1
642e71daabdc8aaf91ce7babf9dab2576cf0513d
-
SHA256
b14c6515cdd01d13676b83d18c312949844c7e7bccd80382e9aed6361d340d74
-
SHA512
5fdbf4846ebd78acbe75de0aaf0d4563368bf082c1f9eceefe7aaba9b8766180ca72df60234218979bc1c20966ff189f84a218c1596e8588cdb46f4ed8d78abc
-
SSDEEP
12288:+k/x166rgYU2JmZl3+rDlp9RTb5pXrK4aG2rTGkJ:3L668Au2D/9pudX
Malware Config
Signatures
Files
-
b14c6515cdd01d13676b83d18c312949844c7e7bccd80382e9aed6361d340d74.exe windows x86
b1f584304d1c7f2899a954905d8318c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
kernel32
SetThreadUILanguage
GetCPInfo
GetConsoleOutputCP
GetLastError
HeapSetInformation
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessW
GetSystemDirectoryW
GetDriveTypeW
DelayLoadFailureHook
GetProcAddress
FreeLibrary
InterlockedCompareExchange
GetStdHandle
WriteFile
FormatMessageW
LocalFree
SetLastError
GetModuleFileNameW
PeekConsoleInputW
GetConsoleMode
SetConsoleMode
ReadConsoleW
GetFileType
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
Sleep
InterlockedExchange
GetCommandLineW
LoadLibraryExA
WriteConsoleW
LoadLibraryW
GetConsoleScreenBufferInfo
LocalAlloc
WideCharToMultiByte
msvcrt
_vsnwprintf_s
free
putchar
__setusermatherr
_amsg_exit
_initterm
__p__commode
_snwprintf_s
_local_unwind4
wcstok
_wcsdup
wcsncat_s
calloc
wcscspn
wcsspn
__set_app_type
__p__fmode
_except_handler4_common
?terminate@@YAXXZ
memmove
_XcptFilter
_exit
_cexit
__getmainargs
wcsrchr
wcsncpy_s
wcsncmp
qsort
_ultow
wcspbrk
iswctype
_wcsupr
_wcsicmp
wcschr
wcscpy_s
wcscat_s
exit
sprintf_s
setlocale
_wcsnicmp
memset
_iob
_fileno
_setmode
_controlfp
malloc
netutils
NetpwNameValidate
NetApiBufferReallocate
NetApiBufferAllocate
NetapipBufferAllocate
NetpwPathType
NetApiBufferFree
browcli
NetServerEnum
samcli
NetUserGetInfo
srvcli
NetShareEnum
NetServerGetInfo
wkscli
NetUseGetInfo
NetWkstaUserGetInfo
NetWkstaGetInfo
NetUseEnum
mpr
WNetEnumResourceW
WNetAddConnection2W
WNetCancelConnection2W
WNetGetLastErrorW
WNetGetConnectionW
WNetOpenEnumW
WNetCloseEnum
iphlpapi
GetCurrentThreadCompartmentId
ntdll
RtlAllocateHeap
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 508KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE