Static task
static1
Behavioral task
behavioral1
Sample
917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe
Resource
win10v2004-20221111-en
General
-
Target
917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604
-
Size
344KB
-
MD5
43d089619cdbe52da0a108b53323357a
-
SHA1
8fa6c6521b78704c573fbd861620d4a3c3509f07
-
SHA256
917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604
-
SHA512
4b3024f8a6c349dd6d7e18d5e852c48d3ba5d9c740049317ee9a5526ef0094db432276065c5adf77aefbc36385de313aab3c31c58d0ad568ba640d26433c4892
-
SSDEEP
6144:yeraajBGcKWx9lLxfBJ2tIxlQxJzLuEZjZzhns4ihvNyTiQhK6dfHYP:oajBGcKWBLxfBxedLuMMyTi/6lM
Malware Config
Signatures
Files
-
917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe windows x86
43bb27a5110cc7e3f703948e902ddb4b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterDeviceNotificationW
wsprintfW
GetWindowThreadProcessId
UnregisterDeviceNotification
wsprintfA
FindWindowW
advapi32
AddAce
RegCloseKey
QueryServiceStatus
RegSetValueExW
RegCreateKeyExW
InitializeSecurityDescriptor
AllocateAndInitializeSid
InitializeAcl
FreeSid
CreateServiceW
SetSecurityDescriptorDacl
OpenProcessToken
SetServiceStatus
GetLengthSid
RegSetKeySecurity
LogonUserW
RegQueryValueExW
QueryServiceConfigW
DeleteService
RegOpenKeyExW
StartServiceCtrlDispatcherW
RegEnumValueW
StartServiceW
RegisterServiceCtrlHandlerExW
ImpersonateLoggedOnUser
CloseServiceHandle
ControlService
OpenSCManagerW
OpenServiceW
kernel32
GetThreadTimes
FindFirstFileW
QueryDosDeviceW
SetThreadPriority
GetThreadPriority
UnmapViewOfFile
SetLastError
CreateFileMappingW
LocalAlloc
GetCurrentThreadId
CloseHandle
CreateFileMappingA
GetOverlappedResult
EnterCriticalSection
WritePrivateProfileStringW
LocalFree
FindClose
ExpandEnvironmentStringsW
ReadDirectoryChangesW
CreateEventA
MapViewOfFile
LoadLibraryExW
GetDriveTypeW
GetFileSize
SetUnhandledExceptionFilter
SetThreadAffinityMask
OpenProcess
CreateEventW
CreateProcessW
CreateFileW
GetVolumeInformationW
DuplicateHandle
GetPrivateProfileIntW
CreateThread
OutputDebugStringW
SuspendThread
IsDebuggerPresent
QueryPerformanceFrequency
DeleteCriticalSection
DeviceIoControl
ResumeThread
WaitForSingleObject
FreeLibrary
GetSystemInfo
FileTimeToSystemTime
GetSystemTimeAsFileTime
SetFileTime
UnhandledExceptionFilter
LeaveCriticalSection
GetWindowsDirectoryW
GetModuleHandleA
GetPrivateProfileStringW
SetEnvironmentVariableW
GetLogicalDrives
ResetEvent
VirtualAlloc
esent
JetCreateIndex
JetDelete
JetSetSystemParameter
JetBeginExternalBackupInstance
JetInit
JetDeleteIndex
JetCreateTable
JetSnapshotStart
JetResetSessionContext
JetStopBackupInstance
JetEndSession
JetCompact
JetOpenDatabase
JetGetAttachInfo
JetGetCursorInfo
JetEnumerateColumns
JetSetDatabaseSize
JetGetSystemParameter
JetGetLock
JetCreateInstance
dsound
DirectSoundCaptureCreate8
GetDeviceID
DirectSoundCaptureEnumerateA
DirectSoundCaptureEnumerateW
DirectSoundEnumerateW
DirectSoundCreate8
DirectSoundEnumerateA
DllGetClassObject
DirectSoundFullDuplexCreate
DirectSoundCreate
DirectSoundCaptureCreate
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 521KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ