Static task
static1
Behavioral task
behavioral1
Sample
b1c7e11dae535c310d248320d2ccb242520acdf4b8044733ab6d6919414bbbd2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b1c7e11dae535c310d248320d2ccb242520acdf4b8044733ab6d6919414bbbd2.exe
Resource
win10v2004-20220812-en
General
-
Target
b1c7e11dae535c310d248320d2ccb242520acdf4b8044733ab6d6919414bbbd2
-
Size
271KB
-
MD5
90c539a7e7511945a9342f700adf8ea4
-
SHA1
d44c9910bdc08d8e166351bcb091e600cc26c166
-
SHA256
b1c7e11dae535c310d248320d2ccb242520acdf4b8044733ab6d6919414bbbd2
-
SHA512
b2ce368c5a717cbc7274f83120b064a703ab7eb623d7f31aee57483335153e6fbcfff82b7fd17a972f2d0fde063da70c20638b5f56c628f3370af16689956073
-
SSDEEP
6144:6+pHlmLwvE7aWEwHvQzXVLR2oMnOEXiv:/m8M7aWTPQzXVN2oYOTv
Malware Config
Signatures
Files
-
b1c7e11dae535c310d248320d2ccb242520acdf4b8044733ab6d6919414bbbd2.exe windows x86
81cbbc6ec3dbb7a06c9b60575f61b0d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
__p__fmode
__set_app_type
_controlfp
_adjust_fdiv
_initterm
_itoa
toupper
towlower
wcsncat
wcschr
_wcsnicmp
free
strncpy
strtoul
strchr
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
??3@YAXPAX@Z
__setusermatherr
sprintf
_strnicmp
_c_exit
malloc
wcscmp
strrchr
memmove
_stricmp
wcsrchr
isdigit
_except_handler3
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
wcscat
memchr
_strcmpi
wcsncpy
_wcsicmp
wcscpy
wcslen
_snwprintf
??2@YAPAXI@Z
_snprintf
calloc
advapi32
DuplicateTokenEx
LookupAccountSidW
CryptAcquireContextW
CreateProcessAsUserW
CryptReleaseContext
LsaOpenPolicy
LsaQueryInformationPolicy
LsaClose
LsaFreeMemory
ImpersonateLoggedOnUser
RevertToSelf
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
RegOpenKeyW
OpenProcessToken
LookupPrivilegeValueW
GetAce
CryptGenRandom
RegCreateKeyExW
RegSetKeySecurity
GetSecurityDescriptorLength
MakeSelfRelativeSD
ReportEventW
GetSidSubAuthority
RegOpenKeyExA
RegQueryValueExA
RegLoadKeyA
RegSetValueExW
RegCreateKeyA
AdjustTokenPrivileges
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LogonUserW
RegOpenKeyExW
RegQueryValueExW
RegisterEventSourceW
DeregisterEventSource
AllocateAndInitializeSid
OpenThreadToken
LookupAccountNameW
GetTokenInformation
EqualSid
RegCloseKey
FreeSid
kernel32
GetConsoleMode
CreateFileA
AllocConsole
FreeConsole
GetModuleFileNameA
lstrcpyW
TerminateProcess
SetEnvironmentVariableA
SetEnvironmentVariableW
GetExitCodeProcess
SetConsoleCtrlHandler
DuplicateHandle
GetCurrentProcess
GetCurrentThread
GetComputerNameExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
FormatMessageW
CreateEventW
WaitForSingleObject
ReleaseMutex
CloseHandle
CreateNamedPipeW
HeapFree
HeapAlloc
GetProcessHeap
VirtualFree
VirtualAlloc
OpenProcess
ExpandEnvironmentStringsA
CreateFileW
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
WaitForMultipleObjects
GetLastError
GetTickCount
GlobalFree
GlobalAlloc
SetLastError
SetHandleInformation
GetStdHandle
WideCharToMultiByte
GetConsoleCP
LoadLibraryW
GetSystemDirectoryW
lstrlenW
ReadFile
WriteFile
GetComputerNameW
GetLocalTime
CancelIo
lstrcpyA
lstrcatA
LocalFree
LocalAlloc
FormatMessageA
GetACP
GetOverlappedResult
ExitProcess
SetErrorMode
MultiByteToWideChar
GenerateConsoleCtrlEvent
SetConsoleScreenBufferSize
SetConsoleWindowInfo
GetConsoleScreenBufferInfo
LoadLibraryExW
IsDBCSLeadByte
WriteConsoleInputA
ExpandEnvironmentStringsW
WriteConsoleW
ReadConsoleOutputA
ReadConsoleOutputW
WriteConsoleInputW
ntdll
RtlEqualUnicodeString
DbgPrint
RtlSubAuthorityCountSid
RtlSubAuthoritySid
RtlInitUnicodeString
user32
VkKeyScanW
GetProcessWindowStation
wsprintfW
CharToOemA
LoadStringW
MapVirtualKeyW
CloseDesktop
OpenDesktopW
CloseWindowStation
SetUserObjectSecurity
oleaut32
VarBstrFromDate
VarDateFromUdate
SysFreeString
psapi
EnumProcesses
security
AcceptSecurityContext
QueryContextAttributesW
ImpersonateSecurityContext
RevertSecurityContext
AcquireCredentialsHandleW
QuerySecurityPackageInfoW
DeleteSecurityContext
FreeCredentialsHandle
FreeContextBuffer
netapi32
NetGetAnyDCName
NetUserGetInfo
NetApiBufferFree
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCancelConnection2W
WNetCloseEnum
WNetAddConnection2W
ws2_32
WSAStringToAddressA
shutdown
WSASocketW
ioctlsocket
setsockopt
WSAStartup
closesocket
WSACleanup
getpeername
WSASetLastError
getservbyport
ntohs
gethostbyaddr
htons
getservbyname
htonl
inet_ntoa
gethostbyname
gethostname
WSAGetLastError
inet_addr
shell32
SHGetFolderPathW
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE