Static task
static1
Behavioral task
behavioral1
Sample
f4fcf97c94deb25d9786cbbd4ca9a4b3ddc70dad817fae412fc04d9825518175.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4fcf97c94deb25d9786cbbd4ca9a4b3ddc70dad817fae412fc04d9825518175.exe
Resource
win10v2004-20221111-en
General
-
Target
f4fcf97c94deb25d9786cbbd4ca9a4b3ddc70dad817fae412fc04d9825518175
-
Size
1.2MB
-
MD5
a65a1f132c4aa3d209f4b4a6e4a47fe4
-
SHA1
93169dc43d328e5889b07d1310fa1a8958f898bb
-
SHA256
f4fcf97c94deb25d9786cbbd4ca9a4b3ddc70dad817fae412fc04d9825518175
-
SHA512
5b7bfcc4aa0fc0e373e99d4c9dd49b75d11ba1b2f92b6695f4be9e56d242e88e6862f7bb4f4243ebf34868dc8c3107d34d599e34ef58148b1bcba0cf7631286f
-
SSDEEP
24576:9ng/G08cz5wOwvqy2jDO9LX72q0fnS1uRoC52jRmKPazj7:/UzmOwvqy2jDO9Lrj0fn2u/2jRmKP8
Malware Config
Signatures
Files
-
f4fcf97c94deb25d9786cbbd4ca9a4b3ddc70dad817fae412fc04d9825518175.exe windows x86
007182e3c4c3d5401633f0c021baf6d2
Code Sign
4e:ea:78:d1:3d:16:32:29:d5:b5:30:7a:ba:85:35:13:86:24:41:8dSigner
Actual PE Digest4e:ea:78:d1:3d:16:32:29:d5:b5:30:7a:ba:85:35:13:86:24:41:8dDigest Algorithmsha1PE Digest MatchesfalseTrustedfalseSigning CertificateNO CERTIFICATEHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
kernel32
GetModuleHandleA
SetCurrentDirectoryW
DuplicateHandle
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
GetFileTime
CreateFileW
GetSystemTimeAsFileTime
LocalFree
WTSGetActiveConsoleSessionId
VirtualFree
SetFilePointer
ReadFile
GetSystemInfo
FreeLibrary
VirtualAlloc
CreateEventW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
GetUserDefaultLangID
SystemTimeToFileTime
QueryPerformanceCounter
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
CreateMutexW
GetTickCount
FormatMessageA
WriteFile
SetLastError
ReleaseMutex
GetCurrentProcessId
InterlockedExchange
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
IsDebuggerPresent
GetNativeSystemInfo
GetVersionExW
SetEndOfFile
FlushFileBuffers
MapViewOfFile
UnmapViewOfFile
GetFileAttributesW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
QueryDosDeviceW
SetInformationJobObject
LoadLibraryExW
SetHandleInformation
VirtualQueryEx
OpenProcess
AssignProcessToJobObject
GetStdHandle
GetProcessId
HeapSetInformation
ResumeThread
GetLocaleInfoW
GetUserDefaultUILanguage
InterlockedExchangeAdd
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
RaiseException
GetCurrentThreadId
CreateThread
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
LocalAlloc
GetSystemDirectoryW
GetWindowsDirectoryW
RegisterWaitForSingleObject
UnregisterWaitEx
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
SetEvent
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
VirtualQuery
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
GetThreadContext
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
SuspendThread
GetThreadLocale
GetACP
LoadLibraryA
CreateFileA
GetTimeZoneInformation
GetStringTypeW
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapReAlloc
HeapAlloc
GetProcessHeap
LCMapStringW
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapSize
GetOEMCP
IsValidCodePage
WriteConsoleW
SetStdHandle
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
InterlockedIncrement
GetCurrentThread
QueueUserAPC
InterlockedDecrement
GetEnvironmentVariableA
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
GetModuleFileNameW
GetTempPathW
GetLastError
GetEnvironmentVariableW
GetCommandLineW
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
CreateRemoteThread
RtlCaptureStackBackTrace
user32
SetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
CreateDesktopW
CharUpperW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
CloseWindowStation
MessageBoxW
userenv
GetProfileType
CreateEnvironmentBlock
DestroyEnvironmentBlock
wtsapi32
WTSQueryUserToken
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
timeGetTime
advapi32
RegSetValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
GetFileSecurityW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
CreateProcessAsUserW
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
SetFileSecurityW
UnregisterTraceGuids
GetTraceEnableLevel
RegisterTraceGuidsW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
SetThreadToken
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RevertToSelf
RegDisablePredefinedCache
Exports
Exports
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetExperimentList2
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
Sections
.text Size: 619KB - Virtual size: 619KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 364KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ