Static task
static1
Behavioral task
behavioral1
Sample
8db2e5399faacd3e93d2de4d1f35a1dfcc1320ba307acdf0da9f7c905dfa040f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8db2e5399faacd3e93d2de4d1f35a1dfcc1320ba307acdf0da9f7c905dfa040f.exe
Resource
win10v2004-20221111-en
General
-
Target
8db2e5399faacd3e93d2de4d1f35a1dfcc1320ba307acdf0da9f7c905dfa040f
-
Size
335KB
-
MD5
78cd7b4cdbbe05b6a1c9e1f132bced25
-
SHA1
5d2d79f3052e8ca5ce766addd4874cc25d06b356
-
SHA256
8db2e5399faacd3e93d2de4d1f35a1dfcc1320ba307acdf0da9f7c905dfa040f
-
SHA512
ce739800cbe0e1fa6d65156016e128a195f6ab978f2450fbc8ccb8a3e88de45d7750e9739492a0f753626ffdfa7732a60d99fcf7007b10bae79e36195eedf948
-
SSDEEP
6144:rDTkT+bYTdPpcjNE4IitaE5XGUSa2Ux4S+RFWKvk6f:gT5TDc64IitaF5arik
Malware Config
Signatures
Files
-
8db2e5399faacd3e93d2de4d1f35a1dfcc1320ba307acdf0da9f7c905dfa040f.exe windows x86
a5577dfb91d8c753e6fa2c9bb2b8a555
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
OpenSCManagerW
OpenServiceW
AdjustTokenPrivileges
LookupPrivilegeValueW
CloseServiceHandle
QueryServiceStatusEx
kernel32
CreateMutexW
SetConsoleCtrlHandler
GetModuleHandleW
GetFileType
GetDateFormatA
ConnectNamedPipe
HeapFree
TlsFree
GetFileSizeEx
WriteConsoleA
HeapAlloc
HeapDestroy
IsValidLocale
GetLocalTime
GetOEMCP
RaiseException
CreateFileW
GetConsoleOutputCP
ReleaseSemaphore
SetStdHandle
GetConsoleMode
CreateEventW
WriteFile
LeaveCriticalSection
SetFilePointer
ReadFile
GetDiskFreeSpaceW
SetHandleCount
LCMapStringW
EnumSystemLocalesA
WideCharToMultiByte
UnhandledExceptionFilter
EnterCriticalSection
GetACP
SetEnvironmentVariableA
GetTimeFormatA
HeapReAlloc
CloseHandle
CompareStringA
GetCommandLineA
GetCurrentThreadId
DeviceIoControl
IsValidCodePage
WriteConsoleW
CreateThread
CompareStringW
HeapSize
InitializeCriticalSectionAndSpinCount
CancelIo
QueryDosDeviceW
CreateSemaphoreW
FreeEnvironmentStringsW
WaitNamedPipeW
VirtualFree
DeleteCriticalSection
SetLastError
WaitForSingleObject
FindNextFileW
FlushFileBuffers
GetStdHandle
FreeEnvironmentStringsA
GetConsoleCP
TlsGetValue
CreateWaitableTimerW
RtlUnwind
GetOverlappedResult
CreateFileA
TlsAlloc
FatalAppExitA
WaitForMultipleObjects
FindClose
VirtualAlloc
LockFileEx
GetUserDefaultLCID
SetUnhandledExceptionFilter
LCMapStringA
TlsSetValue
GetTimeZoneInformation
FindFirstFileW
DisconnectNamedPipe
ReleaseMutex
GetSystemTimeAsFileTime
ResetEvent
GetLogicalDrives
FreeLibrary
UnlockFileEx
GetComputerNameW
SetWaitableTimer
CreateNamedPipeW
IsDebuggerPresent
CompareFileTime
VirtualAllocEx
ntdll
ZwClose
NtQueryFullAttributesFile
_wcsicmp
memcpy
memset
ZwCreateSection
memcmp
ZwQueryDirectoryFile
_wcsnicmp
NtQueryInformationFile
strlen
memmove
ZwOpenFile
towupper
RtlInitUnicodeString
ZwMapViewOfSection
RtlNtStatusToDosError
wcslen
RtlCompareMemory
ZwUnmapViewOfSection
oleaut32
LoadRegTypeLib
VarI1FromDate
VarDecNeg
VarCat
VarUI4FromStr
SysReAllocString
VarBstrFromUI2
VarI4FromDisp
VarUI4FromI4
VarR8FromUI1
VarR4FromUI2
VarCyCmp
LHashValOfNameSys
DispInvoke
SafeArrayGetRecordInfo
VarCyFromDec
SafeArrayCopyData
VarUI1FromDisp
VarI2FromUI4
VarI4FromDate
SafeArrayDestroyData
SysAllocStringByteLen
VariantInit
VarI4FromI8
VarCyFromUI4
VarR4FromR8
VarOr
VarUI4FromDec
VarUI2FromDisp
VarI4FromI1
VarDateFromUI4
VectorFromBstr
odbccu32
SQLGetDescRec
SQLNumParams
SQLMoreResults
SQLBindCol
SQLExecDirect
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 55KB - Virtual size: 648KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 161KB - Virtual size: 706KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 74KB - Virtual size: 818KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ