Static task
static1
Behavioral task
behavioral1
Sample
ecdf81c79e20fcaebeb2e806b507418b3d361045c4c06f527b75b34d8722db8d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ecdf81c79e20fcaebeb2e806b507418b3d361045c4c06f527b75b34d8722db8d.exe
Resource
win10v2004-20221111-en
General
-
Target
ecdf81c79e20fcaebeb2e806b507418b3d361045c4c06f527b75b34d8722db8d
-
Size
227KB
-
MD5
586c0a3c4e872bc745833c1f9d772718
-
SHA1
cfbebec1c5a61ba8d7eeff956ec3759382415900
-
SHA256
ecdf81c79e20fcaebeb2e806b507418b3d361045c4c06f527b75b34d8722db8d
-
SHA512
dd56865ddeec2c3b9f04e7b3addb3a9dd3093c583d86ad929d804347630e44d324a8261e41677a8454e346b6fa7112cd6253013a7970805e2839001a0e00eae9
-
SSDEEP
3072:LbRZZNT1X9WtEpXa9DgbcQ8WYcDc+0TwUdn3uOM8XIWgiGoSPrkWFykIzeG7K5yx:LblNTh9WupXwFQ53DcXPKw
Malware Config
Signatures
Files
-
ecdf81c79e20fcaebeb2e806b507418b3d361045c4c06f527b75b34d8722db8d.exe windows x64
1e91a75eca0fa7efced1ee3fcead4e3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
LsaQueryInformationPolicy
LsaOpenPolicy
LsaClose
CreateWellKnownSid
CreateProcessWithLogonW
CreateProcessAsUserW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
CloseServiceHandle
DeleteService
OpenSCManagerW
OpenServiceW
StartServiceW
QueryServiceStatusEx
ControlService
IsTextUnicode
ConvertSidToStringSidW
OpenProcessToken
GetTokenInformation
LookupAccountSidW
ConvertStringSidToSidW
CryptExportKey
CryptAcquireContextW
CryptGetKeyParam
CryptReleaseContext
CryptEnumProvidersW
CryptGetProvParam
CryptDestroyKey
CryptGetUserKey
OpenEventLogW
GetNumberOfEventLogRecords
ClearEventLogW
CreateServiceW
SetServiceObjectSecurity
BuildSecurityDescriptorW
QueryServiceObjectSecurity
AllocateAndInitializeSid
FreeSid
CryptGetHashParam
CryptSetKeyParam
SystemFunction032
SystemFunction005
CryptImportKey
SystemFunction025
CryptCreateHash
CryptDecrypt
CryptDestroyHash
LsaFreeMemory
CryptHashData
OpenThreadToken
SetThreadToken
DuplicateTokenEx
CheckTokenMembership
CredFree
CredEnumerateW
MD4Final
MD4Init
MD4Update
crypt32
CryptBinaryToStringW
CryptAcquireCertificatePrivateKey
CertGetNameStringW
CertOpenStore
CertFreeCertificateContext
CertAddCertificateContextToStore
CertCloseStore
CertGetCertificateContextProperty
CertEnumCertificatesInStore
CertEnumSystemStore
PFXExportCertStoreEx
cryptdll
CDGenerateRandomBits
CDLocateCSystem
CDLocateCheckSum
MD5Final
MD5Update
MD5Init
ntdsapi
DsBindW
DsAddSidHistoryW
DsUnBindW
shlwapi
PathCanonicalizeW
PathCombineW
PathIsRelativeW
samlib
SamLookupDomainInSamServer
SamFreeMemory
SamGetAliasMembership
SamCloseHandle
SamQueryInformationUser
SamOpenUser
SamEnumerateUsersInDomain
SamGetGroupsForUser
SamLookupNamesInDomain
SamLookupIdsInDomain
SamOpenDomain
SamConnect
SamEnumerateDomainsInSamServer
SamRidToSid
secur32
LsaConnectUntrusted
LsaDeregisterLogonProcess
LsaCallAuthenticationPackage
LsaLookupAuthenticationPackage
LsaFreeReturnBuffer
shell32
CommandLineToArgvW
user32
IsCharAlphaNumericW
ntdll
wcstol
wcstoul
wcsstr
_wcsnicmp
_stricmp
_wcsicmp
wcschr
wcsrchr
RtlUnicodeStringToAnsiString
RtlFreeAnsiString
RtlInitUnicodeString
RtlEqualUnicodeString
NtQueryObject
NtQuerySystemInformation
RtlGetCurrentPeb
NtQueryInformationProcess
RtlCreateUserThread
RtlStringFromGUID
RtlFreeUnicodeString
RtlGetNtVersionNumbers
RtlUpcaseUnicodeString
RtlAppendUnicodeStringToString
NtResumeProcess
RtlAdjustPrivilege
NtSuspendProcess
NtTerminateProcess
RtlEqualString
__chkstk
memcmp
kernel32
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
OutputDebugStringA
GetModuleHandleW
GetCurrentProcessId
GetCurrentThread
SetCurrentDirectoryW
GetConsoleScreenBufferInfo
FillConsoleOutputCharacterW
GetStdHandle
SetConsoleCursorPosition
GetProcAddress
LoadLibraryW
FreeLibrary
FindNextFileW
FindClose
GetFileAttributesW
GetSystemTimeAsFileTime
FindFirstFileW
SetConsoleTitleW
SetConsoleOutputCP
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetTimeFormatW
GetDateFormatW
CreateRemoteThread
WaitForSingleObject
SetLastError
CreateProcessW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
WriteProcessMemory
VirtualAllocEx
VirtualProtectEx
VirtualAlloc
ReadProcessMemory
VirtualFreeEx
VirtualQueryEx
VirtualFree
VirtualQuery
SetFilePointer
DeviceIoControl
DuplicateHandle
GetLastError
OpenProcess
GetCurrentProcess
CloseHandle
GetCurrentDirectoryW
GetFileSizeEx
FlushFileBuffers
CreateFileW
ReadFile
WriteFile
LocalFree
VirtualProtect
Sleep
FileTimeToSystemTime
LocalAlloc
msvcrt
_isatty
ungetc
_write
_lseeki64
_read
__pioinfo
__badioinfo
realloc
?terminate@@YAXXZ
wcstombs
iswctype
ferror
malloc
wctomb
_itoa
_snprintf
_lock
_unlock
_errno
vfwprintf
fflush
_wfopen
localeconv
vwprintf
fclose
free
_wcsdup
_fileno
_setmode
memcpy
memset
__C_specific_handler
__wgetmainargs
_XcptFilter
_exit
_cexit
exit
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
calloc
isdigit
mbtowc
__mb_cur_max
isleadbyte
isxdigit
_iob
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ