Static task
static1
Behavioral task
behavioral1
Sample
f2793ea52aa94965636b7337a2c2a2bfb930d024b3e99d5aaaa50ba0dbce2a28.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2793ea52aa94965636b7337a2c2a2bfb930d024b3e99d5aaaa50ba0dbce2a28.exe
Resource
win10v2004-20221111-en
General
-
Target
f2793ea52aa94965636b7337a2c2a2bfb930d024b3e99d5aaaa50ba0dbce2a28
-
Size
173KB
-
MD5
19646429190759817ab7210a26c58138
-
SHA1
1863b2a1785ea1b80da57acfb4411ae4ab05eee4
-
SHA256
f2793ea52aa94965636b7337a2c2a2bfb930d024b3e99d5aaaa50ba0dbce2a28
-
SHA512
566f76c524a40d07fe5c647852cad43a5023e1349de339256f8fcdd1f701f5b8f12543d3aeb643372e94bfa5a9ca5a41089ec0159f3a9339f5ebb65ddb5f830e
-
SSDEEP
3072:6m40Koy0QQQ4jruFNAeRkVwWORNDDWoDeTR8nKgD5KhNkwuApqzzjIcxwkwVmTLi:nb6kw7RcxhNkXXHssGUFO0j
Malware Config
Signatures
Files
-
f2793ea52aa94965636b7337a2c2a2bfb930d024b3e99d5aaaa50ba0dbce2a28.exe windows x86
808e778568ebc772dbc8bff8e101178f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
_lock
__dllonexit
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_strnicmp
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
calloc
_snprintf
_beginthreadex
atol
sprintf
mbstowcs
wcstombs
_errno
strncmp
atoi
realloc
strncat
srand
rand
_time64
strncpy
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
strrchr
??_U@YAPAXI@Z
free
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
malloc
strchr
memmove
ceil
strstr
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
_CxxThrowException
memset
__CxxFrameHandler3
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
WaitForSingleObject
LoadLibraryA
GetProcAddress
Sleep
TerminateThread
CreateThread
SetEvent
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
ResetEvent
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
lstrcpyA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetLastError
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
DeleteFileA
CloseHandle
GetFileSize
CreateFileA
SetFilePointer
ReadFile
GetModuleFileNameA
GetCurrentProcess
CreateRemoteThread
OpenProcess
ExitThread
GetTickCount
ExitProcess
GetLocalTime
LocalSize
GlobalAlloc
GlobalSize
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetStartupInfoA
CreatePipe
GetSystemInfo
lstrcpyW
Process32Next
lstrcmpiA
GetModuleHandleA
GetCurrentThreadId
InterlockedCompareExchange
UnhandledExceptionFilter
user32
OpenClipboard
EmptyClipboard
SetClipboardData
WindowFromPoint
MapVirtualKeyA
DestroyCursor
LoadCursorA
GetClipboardData
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
CharNextA
wsprintfA
GetMessageA
GetSystemMetrics
SystemParametersInfoA
SendMessageA
GetCursorInfo
ReleaseDC
GetDesktopWindow
SetRect
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
ExitWindowsEx
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CloseWindow
IsWindow
CreateWindowExA
GetDC
GetKeyState
DispatchMessageA
TranslateMessage
gdi32
DeleteDC
GetDIBits
CreateCompatibleBitmap
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
advapi32
RegSetValueExA
OpenServiceA
QueryServiceStatus
ControlService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
GetTokenInformation
LookupAccountSidA
StartServiceA
AbortSystemShutdownA
EnumServicesStatusA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
QueryServiceConfigA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
winmm
waveOutPrepareHeader
waveOutGetNumDevs
waveInAddBuffer
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutOpen
ws2_32
WSAIoctl
select
recv
inet_addr
sendto
connect
gethostbyname
htons
setsockopt
closesocket
WSAStartup
ioctlsocket
listen
accept
getpeername
__WSAFDIsSet
recvfrom
bind
ntohs
getsockname
WSAGetLastError
WSACleanup
htonl
gethostname
inet_ntoa
socket
WSASocketA
send
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
netapi32
NetUserGetInfo
NetApiBufferFree
NetUserEnum
NetUserGetLocalGroups
NetUserSetInfo
NetLocalGroupAddMembers
NetUserAdd
NetUserDel
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSQuerySessionInformationW
WTSEnumerateSessionsA
WTSLogoffSession
WTSDisconnectSession
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
MMNA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
RRT Size: 1024B - Virtual size: 713B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
SSD Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
MMN Size: 1024B - Virtual size: 875B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
TTH Size: 1024B - Virtual size: 695B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
FFG Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.887 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE