Static task
static1
Behavioral task
behavioral1
Sample
7a51b4249d5f54a9a85207eb0c49823bcaaf9a817a84e8164620d3eb4c081698.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a51b4249d5f54a9a85207eb0c49823bcaaf9a817a84e8164620d3eb4c081698.exe
Resource
win10v2004-20221111-en
General
-
Target
7a51b4249d5f54a9a85207eb0c49823bcaaf9a817a84e8164620d3eb4c081698
-
Size
185KB
-
MD5
f2492ce96ff0354e1ef87cfe66917736
-
SHA1
49f2385f14642f9e10a9433da4540158ccdc6cfc
-
SHA256
7a51b4249d5f54a9a85207eb0c49823bcaaf9a817a84e8164620d3eb4c081698
-
SHA512
5f93e3045b92b06541579a16cf20746cff610a73a2b063cbd599471bf3d5b571e57df8e7ca835334d683605cbaf307eb079b32af9071178e677436d17bb380ba
-
SSDEEP
3072:l0ZsDVpcclV7KqyEAQG2L/2VpwH+ImM9F+/ICuYFD00gjJVv8Y/Fq1ceu4EJMdj2:2OLlP1G2L/2VpwerM9F+/ICuYFD00gjb
Malware Config
Signatures
Files
-
7a51b4249d5f54a9a85207eb0c49823bcaaf9a817a84e8164620d3eb4c081698.exe windows x86
05f383c9329f4a6a8e3d3d59e85ada56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSetInformation
ExpandEnvironmentStringsW
CreateActCtxW
ReleaseActCtx
LCMapStringW
lstrlenW
DelayLoadFailureHook
InterlockedExchange
RegisterWaitForSingleObject
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetCommandLineW
ExitProcess
SetProcessAffinityUpdateMode
InitializeCriticalSection
GetProcessHeap
SetErrorMode
HeapAlloc
HeapFree
WideCharToMultiByte
LocalFree
CloseHandle
LocalAlloc
LoadLibraryA
InterlockedCompareExchange
FreeLibrary
Sleep
GetProcAddress
DeactivateActCtx
LoadLibraryExW
GetLastError
ActivateActCtx
LeaveCriticalSection
lstrcmpW
EnterCriticalSection
lstrcmpiW
msvcrt
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
exit
__p__fmode
_exit
memcpy
memset
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_cexit
__wgetmainargs
_XcptFilter
advapi32
GetTokenInformation
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetEntriesInAclW
SetSecurityDescriptorDacl
StartServiceCtrlDispatcherW
RegDisablePredefinedCacheEx
EventRegister
EventEnabled
EventWrite
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegisterServiceCtrlHandlerW
SetServiceStatus
OpenProcessToken
ntdll
RtlSubAuthoritySid
RtlFreeHeap
RtlCopySid
RtlSubAuthorityCountSid
RtlLengthRequiredSid
RtlAllocateHeap
RtlInitializeSid
RtlImageNtHeader
RtlSetProcessIsCritical
RtlUnhandledExceptionFilter
RtlInitializeCriticalSection
rpcrt4
RpcServerListen
RpcServerUnregisterIf
RpcMgmtWaitServerListen
RpcMgmtSetServerStackSize
RpcMgmtStopServerListening
RpcServerUnregisterIfEx
RpcServerRegisterIf
RpcServerUseProtseqEpW
I_RpcMapWin32Status
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 164KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE