Static task
static1
Behavioral task
behavioral1
Sample
47c49be988942d49490f5dcbad5965b14b9e20cf42febd0060102e3814f4c765.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
47c49be988942d49490f5dcbad5965b14b9e20cf42febd0060102e3814f4c765.exe
Resource
win10v2004-20221111-en
General
-
Target
47c49be988942d49490f5dcbad5965b14b9e20cf42febd0060102e3814f4c765
-
Size
49KB
-
MD5
1566de800ea92f18e18504b104823243
-
SHA1
2a0500effbd8f4dc0ef04c9c54a5486f2850e6e9
-
SHA256
47c49be988942d49490f5dcbad5965b14b9e20cf42febd0060102e3814f4c765
-
SHA512
34fc841456ecccef3587c9e60291d12a0a525c4da3936b5915e95a4b93fdfc6a18b42beb03391b33ff0fc6827359db0274a2775ff36926dacdfc62171eed8938
-
SSDEEP
768:yK+do4CrsI6/csHOw+rH545WdvQTGuu1V9Dht+dKqmdS2:yKPuOwoZ45avdPjdLqm
Malware Config
Signatures
Files
-
47c49be988942d49490f5dcbad5965b14b9e20cf42febd0060102e3814f4c765.exe windows x86
96e8f83e121e28b5c8cce7c347cfce41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueA
InitializeSid
RegCloseKey
IsTextUnicode
RegDeleteValueA
IsValidSid
RegEnumValueA
RegFlushKey
IsValidAcl
ClearEventLogA
RegCreateKeyA
CreateServiceA
RegEnumKeyA
IsValidSecurityDescriptor
ControlService
certcli
CAEnumFirstCA
CACloseCA
CACloseCertType
CADeleteCA
shlwapi
UrlIsA
UrlCreateFromPathA
UrlHashA
UrlEscapeA
UrlCombineA
UrlCompareA
PathCommonPrefixA
UrlUnescapeA
UrlIsNoHistoryW
PathCombineA
PathCompactPathA
msimg32
GradientFill
vSetDdrawflag
TransparentBlt
DllInitialize
wtsapi32
WTSVirtualChannelWrite
WTSLogoffSession
WTSQueryUserToken
WTSSetUserConfigW
WTSVirtualChannelOpen
WTSFreeMemory
WTSVirtualChannelPurgeInput
WTSQuerySessionInformationA
WTSOpenServerW
WTSEnumerateServersA
WTSVirtualChannelClose
kernel32
GetGeoInfoA
GetPrivateProfileIntA
SetFilePointer
GetDateFormatA
GetPrivateProfileStructW
GetSystemTimeAsFileTime
CreateDirectoryA
CreateNamedPipeA
ReadConsoleA
VirtualAlloc
WriteConsoleA
ReadFile
GetProcessId
DeviceIoControl
CompareStringA
GetCurrentDirectoryA
FormatMessageA
GetConsoleTitleA
GetPrivateProfileStructW
GetTickCount
GetAtomNameA
WaitForSingleObject
lstrcpynA
GetTimeFormatA
HeapValidate
CloseHandle
GetConsoleAliasW
GetStringTypeA
GetModuleHandleA
GetCurrentProcess
GetProcessHeap
GetNumberFormatW
UpdateResourceA
GetComputerNameA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ