Static task
static1
Behavioral task
behavioral1
Sample
fd25dd581086552335977a12704ec78dca0f940ecc316851909ed462e4a03d25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd25dd581086552335977a12704ec78dca0f940ecc316851909ed462e4a03d25.exe
Resource
win10v2004-20220812-en
General
-
Target
fd25dd581086552335977a12704ec78dca0f940ecc316851909ed462e4a03d25
-
Size
127KB
-
MD5
44dc35e84bb3df6669e47d29e82759f0
-
SHA1
8a8db71f42829547ae451aed3ffe096405434101
-
SHA256
fd25dd581086552335977a12704ec78dca0f940ecc316851909ed462e4a03d25
-
SHA512
4ac8d4351968fbe20c8b662e436b94a186e33ad2e0bfb9fbad19617bec8e4625e1885391a740af0d09ed10eb9a72ae2e1d61508bac3e6f59fd29762683db2552
-
SSDEEP
1536:jHXIiRiCxV4NUQyC29sP7jVKZYf6QWez7dfQwFMRgwGwPWn99e2CgAEO7:jH6CkUQyLnaRF4gwSTNCA
Malware Config
Signatures
Files
-
fd25dd581086552335977a12704ec78dca0f940ecc316851909ed462e4a03d25.exe windows x86
4a65f625c025095eca20a743d74ca6fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
UnregisterTraceGuids
TraceEvent
RegCreateKeyExW
RegisterTraceGuidsW
AdjustTokenPrivileges
RegEnumKeyW
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
RegSetValueExW
OpenProcessToken
LookupPrivilegeValueW
kernel32
CreateProcessW
GetExitCodeProcess
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetErrorMode
OpenEventW
FindNextFileW
FindClose
GetFileAttributesW
RemoveDirectoryW
SetFileAttributesW
CreateDirectoryW
GetCurrentDirectoryW
GetFullPathNameW
CreateFileW
DeviceIoControl
LoadLibraryW
FreeLibrary
ExpandEnvironmentStringsW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
SetVolumeLabelW
GetModuleFileNameW
CreateEventW
CreateThread
WaitForSingleObject
CloseHandle
SetEvent
MulDiv
SetLastError
lstrlenW
GetVersionExW
GetModuleHandleW
GetProcAddress
HeapAlloc
CompareStringW
GetWindowsDirectoryW
SetComputerNameExW
GetLastError
GetProcessHeap
HeapFree
FindFirstFileW
gdi32
GetDeviceCaps
CreateFontIndirectW
GetObjectW
GetTextExtentPoint32W
DeleteObject
user32
SetWindowPos
LoadStringW
SendMessageW
IsWindow
MapWindowPoints
SetWindowTextW
SendDlgItemMessageW
CreateWindowExW
ReleaseDC
GetWindowDC
GetWindowRect
GetDlgItem
GetDC
PostMessageW
ShowWindow
SystemParametersInfoW
SetDlgItemTextW
EndDialog
LoadImageW
DispatchMessageW
TranslateMessage
GetMessageW
CreateDialogParamW
msvcrt
__p__commode
__p__fmode
__set_app_type
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_vsnprintf
memmove
_wcsnicmp
wcschr
__setusermatherr
_vscwprintf
wcsrchr
wcscspn
wcsspn
iswalpha
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
qsort
_wtoi
iswdigit
iswspace
_vsnwprintf
memset
ole32
CoInitializeEx
CoTaskMemFree
CoUninitialize
CoCreateInstance
dnsapi
DnsValidateName_W
wdscore
WdsValidBlackboard
WdsInitialize
WdsCreateBlackboard
WdsFreeData
WdsSetBlackboardValue
WdsInitializeDataStringW
WdsGetBlackboardValue
WdsInitializeDataUInt32
WdsDeleteBlackboardValue
WdsAbortBlackboardItemEnum
WdsEnumFirstBlackboardItem
WdsDestroyBlackboard
WdsTerminate
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
ntdll
NtSetInformationFile
RtlNtStatusToDosError
RtlInitUnicodeString
NtOpenFile
NtDeviceIoControlFile
NtClose
RtlFreeHeap
RtlAllocateHeap
NtQuerySystemInformation
mpr
WNetAddConnection2W
WNetCancelConnection2W
Sections
.text Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE