Static task
static1
Behavioral task
behavioral1
Sample
872c0c10d2b6d2f1d9ffeaf844dc0c4003a88a5cfeba32134b795de68d6aba3a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
872c0c10d2b6d2f1d9ffeaf844dc0c4003a88a5cfeba32134b795de68d6aba3a.exe
Resource
win10v2004-20221111-en
General
-
Target
872c0c10d2b6d2f1d9ffeaf844dc0c4003a88a5cfeba32134b795de68d6aba3a
-
Size
84KB
-
MD5
a8b065eac69beddd56e27f4a081a1bcc
-
SHA1
371c7b80f55ee8b2f23d6f05e85dd15af50d9362
-
SHA256
872c0c10d2b6d2f1d9ffeaf844dc0c4003a88a5cfeba32134b795de68d6aba3a
-
SHA512
bc2cbbc6e75eec25525fa861fbb6b538e657abd7b04a96b528ff51f22d3e630adf16b58322077a34e527a1f02022fb97d9172ee31e582fb180448649eefec522
-
SSDEEP
768:pgizYgH4sVZ4lRdVPRr0lLPS7PTRnnoiRdhHEhoT/G1rYQA/tZ:pjzdBPGBTNnJRX7/G9YZtZ
Malware Config
Signatures
Files
-
872c0c10d2b6d2f1d9ffeaf844dc0c4003a88a5cfeba32134b795de68d6aba3a.exe windows x86
00860fa242ed183ca2f36b0e822b494a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetCurrentThread
CreateThread
GetEnvironmentVariableA
Sleep
VirtualProtectEx
WriteProcessMemory
CloseHandle
OpenProcess
DuplicateHandle
InterlockedDecrement
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
ReadFile
SetStdHandle
LoadLibraryA
GetProcAddress
MultiByteToWideChar
GetLastError
lstrlenA
WideCharToMultiByte
LocalFree
RtlUnwind
HeapAlloc
GetCommandLineA
GetVersion
ExitProcess
HeapFree
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
WriteFile
FlushFileBuffers
SetFilePointer
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
SetThreadToken
DuplicateTokenEx
CreateProcessAsUserA
OpenThreadToken
LookupAccountSidA
GetTokenInformation
RegDeleteKeyA
ole32
CoInitialize
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantClear
psapi
EnumProcessModules
GetModuleBaseNameA
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 4KB - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.topo0 Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.topo1 Size: 4KB - Virtual size: 123B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE