Static task
static1
Behavioral task
behavioral1
Sample
84045a89e00b777367e9745643737906d1324273063196d44ebadccec5298204.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84045a89e00b777367e9745643737906d1324273063196d44ebadccec5298204.exe
Resource
win10v2004-20220901-en
General
-
Target
84045a89e00b777367e9745643737906d1324273063196d44ebadccec5298204
-
Size
697KB
-
MD5
4c10861f6c54ceb52e18138af4de5868
-
SHA1
0eb9dab17905e27e34c857bdd230c3b3bde52ec3
-
SHA256
84045a89e00b777367e9745643737906d1324273063196d44ebadccec5298204
-
SHA512
376fb0960aea86ffd000f52201b1aaa2f00416468b5c017e786356bc2bf3aee7f26a61842b327446f9db25459c8440d05bbc0e870eb95cd824bccda0890d0873
-
SSDEEP
6144:mXlsRIo0K7Td3oG6R6dDiQ8+9nWkWIGmtJQGTJw+h9YGy0ZW+oxiFhGulEkyY:KAILk4G6RaU+8mtJRlYGB4+YiFhz2N
Malware Config
Signatures
Files
-
84045a89e00b777367e9745643737906d1324273063196d44ebadccec5298204.exe windows x86
e93ad77b87b68ce4e910e1ea031f8f00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
HeapAlloc
HeapFree
HeapSetInformation
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LocalAlloc
LocalFree
GetLastError
QueryPerformanceCounter
GetProcAddress
ReadFile
RtlCaptureContext
SetEnvironmentVariableW
SetEvent
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WriteFile
VirtualAllocEx
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetOverlappedResult
GetModuleHandleW
RaiseException
GetModuleHandleA
FreeLibrary
FlushFileBuffers
EnterCriticalSection
DeviceIoControl
DeleteCriticalSection
CreateThread
CreateFileW
CreateEventW
CloseHandle
OutputDebugStringA
BindIoCompletionCallback
user32
LoadIconW
LoadCursorA
GetSystemMetrics
gdi32
CreateHalftonePalette
FillPath
CreateMetaFileA
advapi32
TraceEvent
RegisterTraceGuidsW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
ConvertStringSidToSidW
TraceMessage
UnregisterTraceGuids
RegQueryValueExA
RevertToSelf
ole32
CoInitializeEx
CLSIDFromString
CoUninitialize
msvcrt
wcsncmp
memset
memcpy
exit
_XcptFilter
__dllonexit
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_amsg_exit
_cexit
_controlfp
_errno
_exit
_initterm
_lock
_onexit
_purecall
_unlock
_vsnprintf
_vsnwprintf
_wcsicmp
_wcsnicmp
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 666KB - Virtual size: 666KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata2 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ