Static task
static1
Behavioral task
behavioral1
Sample
138da9a586ff9d48ed3c65833d77f961d56f861f0420cea9d090b9c2ac0d8214.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
138da9a586ff9d48ed3c65833d77f961d56f861f0420cea9d090b9c2ac0d8214.exe
Resource
win10v2004-20220812-en
General
-
Target
138da9a586ff9d48ed3c65833d77f961d56f861f0420cea9d090b9c2ac0d8214
-
Size
212KB
-
MD5
2c0214d609b4ca512ac3bc831e67dd95
-
SHA1
071e54c715c8046c0a42dadb45c9696b1f6731c7
-
SHA256
138da9a586ff9d48ed3c65833d77f961d56f861f0420cea9d090b9c2ac0d8214
-
SHA512
12ed468e96f528bed14902e5c37bfac905d9217803334ac6f706202b5e4c50a7dfcc4ecb348c4aca734e63311cafb43ab0f72b7e8d9647c436ac5be31aee8aec
-
SSDEEP
3072:Gaaq3A1ROZ2+zi/iTPjOpIxFbm+lSlpVdweKexbWdqIbHAKMDhSVNHa3pa2o0q:PYROZZdbm+wZQdlbgKMy6Q
Malware Config
Signatures
Files
-
138da9a586ff9d48ed3c65833d77f961d56f861f0420cea9d090b9c2ac0d8214.exe windows x86
a3dcd02182188ea9266702193bccbd37
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageW
PostThreadMessageW
wsprintfW
CharNextW
GetMessageW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
kernel32
GetModuleFileNameW
GetLastError
Sleep
GetCurrentThreadId
LocalFree
UnhandledExceptionFilter
GetCurrentThread
GetCurrentProcess
GetCommandLineW
CloseHandle
CreateFileW
GetVersionExW
WriteFile
CreateDirectoryW
IsDebuggerPresent
DecodePointer
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
lstrcmpiW
SetUnhandledExceptionFilter
EncodePointer
TerminateProcess
advapi32
CreateServiceW
ControlService
GetLengthSid
IsValidSid
SetSecurityDescriptorOwner
SetServiceStatus
QueryServiceStatus
StartServiceW
InitializeSecurityDescriptor
CopySid
GetTokenInformation
RegisterServiceCtrlHandlerExW
OpenServiceW
SetSecurityDescriptorGroup
StartServiceCtrlDispatcherW
OpenSCManagerW
OpenThreadToken
DeleteService
OpenProcessToken
CloseServiceHandle
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoUninitialize
CoInitializeEx
oleaut32
SafeArrayPutElement
SafeArrayGetElement
VariantInit
SafeArrayDestroy
SafeArrayCreateVector
VariantClear
shlwapi
PathAppendW
msvcr100
_unlock
__dllonexit
_lock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__CxxFrameHandler3
_crt_debugger_hook
_except_handler4_common
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
_controlfp_s
_invoke_watson
??3@YAXPAX@Z
free
malloc
_vsnwprintf
??2@YAPAXI@Z
_CxxThrowException
memset
?terminate@@YAXXZ
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_onexit
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 496KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE