Static task
static1
Behavioral task
behavioral1
Sample
24733024aa152f6dbed359e96fa6f99ac2fe73060f7693870163935068142e99.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
24733024aa152f6dbed359e96fa6f99ac2fe73060f7693870163935068142e99.exe
Resource
win10v2004-20221111-en
General
-
Target
24733024aa152f6dbed359e96fa6f99ac2fe73060f7693870163935068142e99
-
Size
820KB
-
MD5
2aaf120bfca182d0cd1b6a2a4598aae0
-
SHA1
bfc34ceb37be6a9ea311e4d029f635a96d3e409e
-
SHA256
24733024aa152f6dbed359e96fa6f99ac2fe73060f7693870163935068142e99
-
SHA512
29dd9fbcc00165c04362bc1f80c36a08631e3079317116658240112998fe485c52b59108272d96e6d1ac27d8cdfd21298797396b95cfa53a4a4cbfe654a581a7
-
SSDEEP
12288:fwaHC/LVT2A6ZVZEqmLH3ZFZbYffgo+Lc9QbE0dLaIlBVMLAfnjRzIq7EfIS2G:f5C/LVH6EqmLXZXbCfgNk+EGjNIh
Malware Config
Signatures
Files
-
24733024aa152f6dbed359e96fa6f99ac2fe73060f7693870163935068142e99.exe windows x86
eb52c6200e238832d03c127af308e200
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionAndSpinCount
SetEndOfFile
SetFilePointerEx
GetSystemInfo
SetThreadIdealProcessor
FlushFileBuffers
CompareStringW
GetFileAttributesW
GetTempFileNameW
DeleteFileW
ResetEvent
SetFileAttributesW
GetFullPathNameW
lstrlenW
HeapReAlloc
SetFilePointer
WriteFile
ReleaseMutex
FormatMessageW
GetOverlappedResult
LoadLibraryW
GetProcAddress
FreeLibrary
SetLastError
DeviceIoControl
GetFileSizeEx
ReadFile
GetDriveTypeW
GetFileInformationByHandle
DuplicateHandle
GetVolumeInformationW
CreateDirectoryW
RemoveDirectoryW
LocalAlloc
LockFileEx
UnlockFileEx
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
ExpandEnvironmentStringsW
CreateEventW
CreateThread
WaitForMultipleObjects
CreateMutexW
WaitForSingleObject
SetEvent
GetLastError
CloseHandle
HeapFree
GetProcessHeap
DeleteCriticalSection
HeapAlloc
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
LocalFree
GetCurrentThread
GetTempPathW
CreateFileW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
user32
TranslateMessage
DispatchMessageW
GetMessageW
msvcrt
_onexit
_lock
__dllonexit
_unlock
_controlfp
?terminate@@YAXXZ
memmove
memcpy
memset
_vsnwprintf
_wcsnicmp
_wcsicmp
_vscwprintf
wcsncmp
wcsrchr
iswspace
??2@YAPAXI@Z
??3@YAXPAX@Z
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_purecall
wcschr
ntdll
RtlDosPathNameToNtPathName_U
RtlNtStatusToDosError
NtSetInformationFile
NtQueryInformationFile
NtCreateFile
RtlAdjustPrivilege
RtlFreeHeap
RtlUnwind
RtlAllocateHeap
RtlInitializeCriticalSection
RtlDeleteCriticalSection
RtlReAllocateHeap
RtlLeaveCriticalSection
RtlEnterCriticalSection
RtlRaiseStatus
NtYieldExecution
rpcrt4
UuidFromStringW
RpcImpersonateClient
RpcMgmtStopServerListening
RpcMgmtWaitServerListen
RpcRevertToSelf
RpcServerUseProtseqEpW
RpcServerRegisterIf
RpcServerRegisterAuthInfoW
RpcServerListen
NdrServerCall2
UuidToStringW
UuidCreate
RpcStringFreeW
advapi32
RegQueryValueExW
OpenEncryptedFileRawW
WriteEncryptedFileRaw
CloseEncryptedFileRaw
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
GetSecurityDescriptorControl
GetAclInformation
SetSecurityInfo
RegOpenKeyExW
RegCloseKey
OpenThreadToken
SetThreadToken
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAceEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
Sections
.text Size: 287KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE