Static task
static1
Behavioral task
behavioral1
Sample
79371b6ce19c22f22e72f13174a15de25b118c200743314b3227ce7833e94929.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79371b6ce19c22f22e72f13174a15de25b118c200743314b3227ce7833e94929.exe
Resource
win10v2004-20220901-en
General
-
Target
79371b6ce19c22f22e72f13174a15de25b118c200743314b3227ce7833e94929
-
Size
48KB
-
MD5
9784036b98def1215e221d3fbbe106fc
-
SHA1
86537cc984850ba792f4a41436f3ff97cbb77db7
-
SHA256
79371b6ce19c22f22e72f13174a15de25b118c200743314b3227ce7833e94929
-
SHA512
07b72c5856da9fb4dc88a943c944a3c1c22b7412c6a4e27cedf047c9d17ca69ac58d936f08762baaca91f827c4c8fc135c22dd80be514308b8f747999d522dd6
-
SSDEEP
768:fOFT4hx6/jEQgkTwQVWyK4SFJG7z9b1mIdoCFMA6cRVPAHkfShlw4BJp37:fDxO+kTwQVCGf9bsd/Q8Hdvw4BJh
Malware Config
Signatures
Files
-
79371b6ce19c22f22e72f13174a15de25b118c200743314b3227ce7833e94929.exe windows x86
20e41ce01f80755f4eea7fc12deb3017
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
ZwReadFile
ZwQueryInformationFile
strrchr
ZwCreateFile
ZwWriteFile
ZwQueryVolumeInformationFile
ZwQueryDirectoryFile
wcslen
ZwSetInformationFile
RtlAdjustPrivilege
RtlIpv4StringToAddressA
ZwOpenThreadTokenEx
_wcsicmp
strcmp
strcpy
sprintf
memcmp
strchr
ZwSetSecurityObject
LdrAccessResource
wcsrchr
swprintf
strlen
RtlDestroyQueryDebugBuffer
RtlQueryProcessDebugInformation
RtlCreateQueryDebugBuffer
RtlEqualUnicodeString
ZwQuerySystemInformation
ZwSuspendThread
ZwQueryInformationThread
ZwOpenThread
_stricmp
RtlNtStatusToDosError
RtlIpv4AddressToStringA
ZwClose
ZwEnumerateKey
ZwOpenKey
ZwQueryKey
ZwResumeThread
ZwLoadDriver
ZwCreateSymbolicLinkObject
ZwUnmapViewOfSection
ZwFlushVirtualMemory
RtlImageNtHeader
ZwMapViewOfSection
ZwCreateSection
ZwFsControlFile
ZwOpenFile
ZwSetValueKey
ZwCreateKey
LdrFindResource_U
RtlInitUnicodeString
ZwAdjustPrivilegesToken
memset
RtlIpv4StringToAddressW
ZwQueryValueKey
ZwImpersonateThread
memcpy
kernel32
DeleteTimerQueueTimer
Sleep
GetVersion
ExitProcess
GetTickCount
CreateTimerQueueTimer
VirtualAlloc
GetSystemTimeAsFileTime
GetLastError
BindIoCompletionCallback
LocalFree
LocalAlloc
advapi32
MD5Update
MD5Final
MD5Init
ws2_32
WSACleanup
WSARecvFrom
WSASendTo
setsockopt
WSASend
WSARecv
WSAIoctl
bind
closesocket
WSAGetLastError
WSASocketW
WSAStartup
cabinet
ord20
ord22
ord23
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 432B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ