Static task
static1
Behavioral task
behavioral1
Sample
49e1a809760465e298a468e3f7ab95b5208d291634246e8e41dc8385cf26d77b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
49e1a809760465e298a468e3f7ab95b5208d291634246e8e41dc8385cf26d77b.exe
Resource
win10v2004-20221111-en
General
-
Target
49e1a809760465e298a468e3f7ab95b5208d291634246e8e41dc8385cf26d77b
-
Size
246KB
-
MD5
f3cfec2f88ff1f70b1630666db6526ca
-
SHA1
db9e1ec451fac21cf13702157d05b0b6e560f3c1
-
SHA256
49e1a809760465e298a468e3f7ab95b5208d291634246e8e41dc8385cf26d77b
-
SHA512
57acb3d740c2f24afbcfc2036d11ebb29354a5650c19d248533e2adaa384511479996dd22fd8a0a190364e7677f323824e7a211e5bab84c70c780c5eb9ea7bc1
-
SSDEEP
6144:6wossuEKC5eG+K2leoarpw+tO2Pq+iUQv:HoRhPseoar+r+iv
Malware Config
Signatures
Files
-
49e1a809760465e298a468e3f7ab95b5208d291634246e8e41dc8385cf26d77b.exe windows x86
3b4d252cdb2dffd4f1dc99716ea735b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
DeleteService
CloseServiceHandle
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegQueryValueExA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
ChangeServiceConfigA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
kernel32
CloseHandle
CreateThread
CreateSemaphoreA
GetPrivateProfileIntW
MapViewOfFileEx
EndUpdateResourceW
HeapWalk
SetThreadContext
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringA
WideCharToMultiByte
GetTimeZoneInformation
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
RtlUnwind
LoadLibraryExA
InitializeCriticalSection
Sleep
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
VirtualProtect
GetSystemInfo
VirtualQuery
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileA
Sections
.text Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ