Static task
static1
Behavioral task
behavioral1
Sample
985a7eb4d8cb1563b06adf46198e2ea118a370bd6f9da08f573c0681ab73e20f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
985a7eb4d8cb1563b06adf46198e2ea118a370bd6f9da08f573c0681ab73e20f.exe
Resource
win10v2004-20220812-en
General
-
Target
985a7eb4d8cb1563b06adf46198e2ea118a370bd6f9da08f573c0681ab73e20f
-
Size
277KB
-
MD5
3cdd466b30a8d5175f1c8f5ce2c592a4
-
SHA1
071c94dcbb35a920328b1a787ff2ba6ec0395c5c
-
SHA256
985a7eb4d8cb1563b06adf46198e2ea118a370bd6f9da08f573c0681ab73e20f
-
SHA512
4f107bbf4780ce2805c6672c6f810e09d0ce73888a0e68d5524c3850305687e51456e04e80934d0b3770fc43214347244f8d4031f9a836576baa72dbdfda0dd3
-
SSDEEP
6144:V6FyHwU+uQ5Srp3ybPFQNu8MDKkqZyft8T8cEfkXb1lcD8aDiuYnNlnx5:V7zUAZSKu8U7l5cEG3oTDiVnJ5
Malware Config
Signatures
Files
-
985a7eb4d8cb1563b06adf46198e2ea118a370bd6f9da08f573c0681ab73e20f.exe windows x86
b956c59907e4d0c4d315ad83d100d333
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetSidLengthRequired
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
MakeAbsoluteSD
RegDeleteKeyW
GetTokenInformation
OpenThreadToken
ConvertStringSidToSidW
GetSecurityDescriptorDacl
RegCreateKeyExW
ConvertSidToStringSidW
GetSidSubAuthority
OpenProcessToken
InitializeSecurityDescriptor
InitializeSid
RegCloseKey
GetLengthSid
MakeSelfRelativeSD
InitializeAcl
IsValidSid
GetSidSubAuthorityCount
LookupAccountSidW
SetSecurityDescriptorDacl
GetSecurityDescriptorLength
EqualSid
GetSecurityDescriptorGroup
CopySid
GetSecurityDescriptorControl
SetSecurityDescriptorOwner
GetSecurityDescriptorOwner
RegOpenKeyExW
RegDeleteValueW
GetAclInformation
AddAce
GetSecurityDescriptorSacl
oleaut32
SafeArrayGetVartype
SysAllocString
SysAllocStringByteLen
SafeArrayUnlock
SysFreeString
VariantClear
VariantCopy
VarCmp
SafeArrayCreate
VariantInit
SysStringByteLen
SysAllocStringLen
SafeArrayRedim
VariantChangeType
SysStringLen
VarUI4FromStr
UnRegisterTypeLi
LoadTypeLi
VarBstrCmp
LoadRegTypeLi
SetErrorInfo
SafeArrayLock
SafeArrayGetLBound
VariantCopyInd
CreateErrorInfo
SafeArrayDestroy
RegisterTypeLi
SafeArrayCopy
SafeArrayGetUBound
kernel32
DeleteCriticalSection
LoadLibraryExW
FindResourceExW
HeapFree
HeapSize
HeapDestroy
FormatMessageW
LocalFree
SetThreadLocale
GetThreadLocale
EnterCriticalSection
HeapReAlloc
FreeLibrary
CreateEventW
UnhandledExceptionFilter
lstrlenW
LeaveCriticalSection
LoadResource
ResetEvent
GetCurrentThreadId
SizeofResource
GetModuleHandleW
IsDebuggerPresent
GetACP
LockResource
RaiseException
SetUnhandledExceptionFilter
FindResourceW
GetSystemTimeAsFileTime
GetProcessHeap
CloseHandle
lstrcmpiW
HeapAlloc
LoadLibraryA
VirtualAlloc
ole32
ProgIDFromCLSID
CoTaskMemAlloc
CoTaskMemFree
CoRevertToSelf
StringFromGUID2
CoTaskMemRealloc
CoCreateInstance
CoImpersonateClient
user32
UnregisterClassA
LoadStringW
wsprintfW
CharNextW
userenv
UnloadUserProfile
esent
JetCreateTable
JetRetrieveTaggedColumnList
JetDetachDatabase2
JetSetTableSequential
JetGetLogInfo
JetInit3
JetRetrieveColumns
JetEndExternalBackupInstance
JetGetAttachInfoInstance
JetAttachDatabase2
JetExternalRestore
ese
JetGetTruncateLogInfoInstance
JetSetSystemParameter
JetDeleteColumn2
mspatcha
GetFilePatchSignatureW
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 246KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ