Static task
static1
Behavioral task
behavioral1
Sample
76073e1a88ec0b179715da41fc97a93e6d253be7031b0a217307239466a6e824.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
76073e1a88ec0b179715da41fc97a93e6d253be7031b0a217307239466a6e824.exe
Resource
win10v2004-20220812-en
General
-
Target
76073e1a88ec0b179715da41fc97a93e6d253be7031b0a217307239466a6e824
-
Size
320KB
-
MD5
72bb5cef12da1d4300e7115f2a92bea4
-
SHA1
ea741fc0c45265200280babd49c89ee2d6b61c31
-
SHA256
76073e1a88ec0b179715da41fc97a93e6d253be7031b0a217307239466a6e824
-
SHA512
0ab445b43f644f2e03ab28e38cc9f4471936876a244c0426063ff12900c370098bb33e97f24bb888176d526af54a7130879dfe847a6f195f2bb2823601499be7
-
SSDEEP
6144:lwUYSTXMHwoOYe/46fprelMsmnHqzLCsv83Auzwq1Jujq3s08SFf21I2Qzj:lf+Oppreesmn3svTuUq7KqDnf21I2Q/
Malware Config
Signatures
Files
-
76073e1a88ec0b179715da41fc97a93e6d253be7031b0a217307239466a6e824.exe windows x86
f3a3b7649aeadda58a529e62761fb310
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenServiceW
StartServiceA
OpenServiceA
OpenSCManagerA
RegCloseKey
CloseServiceHandle
CryptReleaseContext
CryptAcquireContextA
QueryServiceStatus
QueryServiceStatusEx
ControlService
CryptGenRandom
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyExA
kernel32
LeaveCriticalSection
SizeofResource
DeleteCriticalSection
FindClose
GetProcessHeap
GetThreadLocale
FindNextChangeNotification
OpenProcess
WideCharToMultiByte
CreateFileMappingA
MapViewOfFile
HeapFree
FindResourceExA
WaitForSingleObject
LoadResource
CreateSemaphoreA
RaiseException
UnmapViewOfFile
DeleteFileA
GetSystemTime
ReleaseSemaphore
CreateThread
RemoveDirectoryA
LocalFree
lstrlenA
FindCloseChangeNotification
HeapDestroy
HeapAlloc
GetACP
GetSystemTimeAsFileTime
EnterCriticalSection
CreateEventA
WaitForMultipleObjects
FindFirstChangeNotificationA
CreateMutexA
OpenFileMappingA
CloseHandle
ResumeThread
HeapReAlloc
FindFirstFileA
CreateDirectoryA
FormatMessageA
LockResource
TlsGetValue
HeapSize
FindNextFileA
LocalAlloc
FindResourceA
ReleaseMutex
GetCurrentThreadId
TlsSetValue
BeginUpdateResourceW
VirtualAllocEx
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
VarUdateFromDate
rpcrt4
RpcStringFreeA
UuidCreate
UuidToStringA
user32
wsprintfA
shlwapi
PathIsUNCA
PathIsURLA
ole32
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleRun
esent
JetCreateIndex
JetDelete
JetGotoBookmark
JetFreeBuffer
JetInit3
JetGetCurrentIndex
JetAddColumn
JetDetachDatabase
JetOpenDatabase
JetGetLock
JetOpenFileSectionInstance
JetOpenFile
JetDefragment2
JetGotoSecondaryIndexBookmark
JetEscrowUpdate
JetTerm2
adsnt
DllGetClassObject
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 289KB - Virtual size: 931KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ