Static task
static1
Behavioral task
behavioral1
Sample
0738a74972fde1071e767e647dd44946599a5fe686b3e88fa199e86705772cf8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0738a74972fde1071e767e647dd44946599a5fe686b3e88fa199e86705772cf8.exe
Resource
win10v2004-20220812-en
General
-
Target
0738a74972fde1071e767e647dd44946599a5fe686b3e88fa199e86705772cf8
-
Size
533KB
-
MD5
8dbd28679e2c39befaddde066ce558a7
-
SHA1
ab519f63dac6157ba96a6fbf0be4f61e23d07e0c
-
SHA256
0738a74972fde1071e767e647dd44946599a5fe686b3e88fa199e86705772cf8
-
SHA512
9f9770f1bf8c3e5716e8c2e22f337781dc6cb9ac0a6558a52729cf5e7a6a19dc02da8025e8f953064d1a10fdb2ff7247e4339725183f194d4dafbc048cad6156
-
SSDEEP
6144:PeshsBg83x3RCzzh5NkVsuaRaU6mHGVGXmm5+:PeI23R6h0aRz6mHGMWc
Malware Config
Signatures
Files
-
0738a74972fde1071e767e647dd44946599a5fe686b3e88fa199e86705772cf8.exe windows x86
4fedbdd1db6b36789ec5403ad0d3d81b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ProcessIdToSessionId
GetModuleHandleA
LoadLibraryA
WriteConsoleW
SetFilePointerEx
GetProcAddress
GetLastError
CreateEventA
SetEvent
WaitForSingleObject
LockResource
GetSystemDirectoryA
SizeofResource
WriteFile
LoadResource
FindResourceA
CreateFileA
GetTempPathA
CreateThread
GetNativeSystemInfo
DeleteFileA
CloseHandle
CreateToolhelp32Snapshot
Process32Next
TerminateProcess
Sleep
OpenProcess
GetPriorityClass
Process32First
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapSize
HeapReAlloc
RtlUnwind
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
LCMapStringW
CreateFileW
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
InterlockedIncrement
InterlockedDecrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
MultiByteToWideChar
HeapFree
HeapAlloc
RaiseException
ExitProcess
GetModuleHandleExW
GetStdHandle
GetModuleFileNameW
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
advapi32
ControlService
QueryServiceConfigA
OpenSCManagerA
SetServiceStatus
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
CreateServiceA
RegisterServiceCtrlHandlerA
ChangeServiceConfig2A
EnumServicesStatusA
DeleteService
OpenProcessToken
CloseServiceHandle
OpenServiceA
CreateProcessAsUserA
StartServiceCtrlDispatcherA
RegCloseKey
RegOpenKeyA
RegDeleteValueA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
wininet
HttpSendRequestA
DeleteUrlCacheEntry
InternetCloseHandle
InternetOpenA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetReadFile
InternetConnectA
urlmon
URLDownloadToFileA
userenv
CreateEnvironmentBlock
wtsapi32
WTSQueryUserToken
psapi
GetModuleFileNameExA
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 442KB - Virtual size: 442KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ