Static task
static1
Behavioral task
behavioral1
Sample
f5019fb5fb9e41ff14d181825363b00621ab4335fdf1c37e38511bac016676dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5019fb5fb9e41ff14d181825363b00621ab4335fdf1c37e38511bac016676dd.exe
Resource
win10v2004-20221111-en
General
-
Target
f5019fb5fb9e41ff14d181825363b00621ab4335fdf1c37e38511bac016676dd
-
Size
49KB
-
MD5
6f6827c96bac2f530e7011f5e4b85eb7
-
SHA1
2104dd026874d043113ac529bbe340d873baf0d8
-
SHA256
f5019fb5fb9e41ff14d181825363b00621ab4335fdf1c37e38511bac016676dd
-
SHA512
b775249435f40ca4a4e3a3b4f7e865eea150790cb9dffe7edbc5b6dba13726143f05b554044280b75c8c922b753e52bd429146d3ccc3efa8a809f70abbef0be6
-
SSDEEP
768:PK+do4CrsI6/csHOw+rH545WdvQTGuu1V9Dht+dKqmdS2:PKPuOwoZ45avdPjdLqm
Malware Config
Signatures
Files
-
f5019fb5fb9e41ff14d181825363b00621ab4335fdf1c37e38511bac016676dd.exe windows x86
96e8f83e121e28b5c8cce7c347cfce41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueA
InitializeSid
RegCloseKey
IsTextUnicode
RegDeleteValueA
IsValidSid
RegEnumValueA
RegFlushKey
IsValidAcl
ClearEventLogA
RegCreateKeyA
CreateServiceA
RegEnumKeyA
IsValidSecurityDescriptor
ControlService
certcli
CAEnumFirstCA
CACloseCA
CACloseCertType
CADeleteCA
shlwapi
UrlIsA
UrlCreateFromPathA
UrlHashA
UrlEscapeA
UrlCombineA
UrlCompareA
PathCommonPrefixA
UrlUnescapeA
UrlIsNoHistoryW
PathCombineA
PathCompactPathA
msimg32
GradientFill
vSetDdrawflag
TransparentBlt
DllInitialize
wtsapi32
WTSVirtualChannelWrite
WTSLogoffSession
WTSQueryUserToken
WTSSetUserConfigW
WTSVirtualChannelOpen
WTSFreeMemory
WTSVirtualChannelPurgeInput
WTSQuerySessionInformationA
WTSOpenServerW
WTSEnumerateServersA
WTSVirtualChannelClose
kernel32
GetGeoInfoA
GetPrivateProfileIntA
SetFilePointer
GetDateFormatA
GetPrivateProfileStructW
GetSystemTimeAsFileTime
CreateDirectoryA
CreateNamedPipeA
ReadConsoleA
VirtualAlloc
WriteConsoleA
ReadFile
GetProcessId
DeviceIoControl
CompareStringA
GetCurrentDirectoryA
FormatMessageA
GetConsoleTitleA
GetPrivateProfileStructW
GetTickCount
GetAtomNameA
WaitForSingleObject
lstrcpynA
GetTimeFormatA
HeapValidate
CloseHandle
GetConsoleAliasW
GetStringTypeA
GetModuleHandleA
GetCurrentProcess
GetProcessHeap
GetNumberFormatW
UpdateResourceA
GetComputerNameA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ