Static task
static1
Behavioral task
behavioral1
Sample
89bcb4a0e025c5f6c8bc0222516ca5414c8813f148c0027ae3c24de754ecb97a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
89bcb4a0e025c5f6c8bc0222516ca5414c8813f148c0027ae3c24de754ecb97a.exe
Resource
win10v2004-20220901-en
General
-
Target
89bcb4a0e025c5f6c8bc0222516ca5414c8813f148c0027ae3c24de754ecb97a
-
Size
1.2MB
-
MD5
9ab44ecd8f0498647027bc36600e2b02
-
SHA1
1ec355397d4f8b1ba01f828d4ec59363278e4045
-
SHA256
89bcb4a0e025c5f6c8bc0222516ca5414c8813f148c0027ae3c24de754ecb97a
-
SHA512
c0a0c01b0520bf757e652edb64514960d24d29e1adcb4bc1c26cef236d9da32b6d8b575d6dde9e77a1ed2adae36158018bb7180519539b37f2bd405c6b2a7054
-
SSDEEP
24576:cC5PZ9LCVrIRtK/f/fvJyeJfD4m8a8/FAQyWH6UrILiNPaqFW9xo0:c2Q/f/fvJy+l2yefHNS7o0
Malware Config
Signatures
Files
-
89bcb4a0e025c5f6c8bc0222516ca5414c8813f148c0027ae3c24de754ecb97a.exe windows x86
f31149838623123ff28b20b7e8d38e68
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
CloseServiceHandle
ControlService
InitializeSecurityDescriptor
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
SetEntriesInAclA
SetSecurityDescriptorDacl
SetSecurityInfo
SetServiceObjectSecurity
kernel32
AddAtomA
CloseHandle
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindAtomA
FreeLibrary
GetAtomNameA
GetCommandLineA
GetCurrentProcess
GetEnvironmentVariableA
GetFileAttributesA
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetTempPathA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MoveFileExA
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
ReleaseSemaphore
SetErrorMode
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
msvcrt
_fdopen
_read
_strdup
_strlwr
_write
__getmainargs
__lc_codepage
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_ctype
_errno
_filelengthi64
_fstati64
_iob
_lseeki64
_onexit
_setmode
abort
atexit
atoi
fclose
fflush
fgetpos
fopen
fputc
fread
free
fsetpos
fwrite
getc
getenv
isalnum
localeconv
malloc
memchr
memcpy
memmove
memset
putc
realloc
setlocale
setvbuf
signal
strcmp
strcoll
strcpy
strftime
strlen
strstr
strtod
strtok
strxfrm
time
ungetc
wcslen
user32
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
GetMessageA
KillTimer
LoadCursorA
PostQuitMessage
RegisterClassExA
SetTimer
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
wininet
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
Sections
.text Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 712KB - Virtual size: 712KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE