Static task
static1
Behavioral task
behavioral1
Sample
87e05a2d01aca24f593a1e3dec29a20450f20e4214558b6e37f8abf6498bb86e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87e05a2d01aca24f593a1e3dec29a20450f20e4214558b6e37f8abf6498bb86e.exe
Resource
win10v2004-20221111-en
General
-
Target
87e05a2d01aca24f593a1e3dec29a20450f20e4214558b6e37f8abf6498bb86e
-
Size
204KB
-
MD5
4e9aa93cf98cc38774a3456683bac8a2
-
SHA1
e49c861e28e3df9128272bed60892b634bdbb669
-
SHA256
87e05a2d01aca24f593a1e3dec29a20450f20e4214558b6e37f8abf6498bb86e
-
SHA512
4d48fbf6b56c6a54c4d3163edc1356b41813901625e4919093566e23684311dad005fe27d0b468d208b55e4c9bdda0f6a2eeb64642cf85896b900301c18c40c6
-
SSDEEP
3072:kLMZqUA56dmgZXN6g9GWIt6Dk/O3BkZdnCVp68/JpTbk3nbF9t4IhAxFnKgTzn9H:a2dhRgWa68OGdCVTpUXR9tTSxFnK0zn
Malware Config
Signatures
Files
-
87e05a2d01aca24f593a1e3dec29a20450f20e4214558b6e37f8abf6498bb86e.exe windows x86
76b67d98ee006dad26f4ca799053da49
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
QueryServiceStatus
OpenThreadToken
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
SetServiceStatus
SetSecurityDescriptorDacl
RegisterServiceCtrlHandlerA
RegSetValueExA
RegEnumKeyA
InitializeSecurityDescriptor
StartServiceCtrlDispatcherA
OpenProcessToken
FreeSid
AllocateAndInitializeSid
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
setupapi
SetupRemoveFromDiskSpaceListA
SetupQueryDrivesInDiskSpaceListA
SetupDestroyDiskSpaceList
SetupAdjustDiskSpaceListA
SetupDuplicateDiskSpaceListA
SetupGetInfFileListA
SetupScanFileQueueA
SetupInstallFilesFromInfSectionA
SetupOpenAppendInfFileA
SetupOpenFileQueue
SetupGetSourceFileLocationA
SetupGetSourceFileSizeA
SetupCloseFileQueue
SetupCloseInfFile
SetupCommitFileQueueA
SetupDecompressOrCopyFileA
SetupQueryInfFileInformationA
SetupOpenInfFileA
kernel32
HeapSize
SetEndOfFile
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
InitializeCriticalSection
CreateFileA
GetOEMCP
GetACP
Sleep
CloseHandle
GetStartupInfoA
CopyFileA
DeleteFileA
GetTickCount
CreateEventA
GetVersion
GetVolumeInformationA
LoadLibraryA
ExitProcess
WideCharToMultiByte
GetModuleFileNameA
CreateProcessA
SetFileAttributesA
SetTapePosition
VirtualProtect
BeginUpdateResourceA
GetSystemInfo
HeapAlloc
GetModuleHandleA
GetCommandLineA
GetVersionExA
GetLastError
WriteFile
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
HeapFree
ReadFile
SetFilePointer
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetStdHandle
FlushFileBuffers
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetCPInfo
GetLocaleInfoA
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ