Static task
static1
Behavioral task
behavioral1
Sample
server.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
������~1.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
������~1.exe
Resource
win10v2004-20220812-en
General
-
Target
69250fa69361dac5d4fbf9610b44b7d2c8363147650c82227702650a55571176
-
Size
522KB
-
MD5
b61e9f3b31767d617ed440d9cc5956b0
-
SHA1
2e6eba0c0daffd742d122a475c5ef669a028fb99
-
SHA256
69250fa69361dac5d4fbf9610b44b7d2c8363147650c82227702650a55571176
-
SHA512
732fb6c50f99a9c6871406fbc0a51c16da789e39303e77c8ab42aa997b5f253842784073373f3887da9e12a8c77540227b456657b9d19ee90a33b7f4b90cf05a
-
SSDEEP
12288:QKDzbQPODXQEdr8obMJQa+rP5xRDGoCnWaRcXLu73B:QK3kPOfr8obSQaOPFqxTma73B
Malware Config
Signatures
Files
-
69250fa69361dac5d4fbf9610b44b7d2c8363147650c82227702650a55571176.cab
-
server.exe.exe windows x86
e176eddb1527ed223c772cd89d6faeaa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
OpenProcess
VirtualFreeEx
Process32First
CreateToolhelp32Snapshot
SetUnhandledExceptionFilter
Sleep
CreateMutexA
GetCommandLineA
GetCurrentThreadId
GetStartupInfoA
Process32Next
GetCurrentProcess
GetModuleFileNameA
SetFilePointer
ReadFile
GetFileAttributesA
SetLastError
lstrcmpiA
lstrcpyA
GetTempPathA
GetTickCount
FindResourceA
HeapFree
LoadResource
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
lstrlenA
CloseHandle
FreeResource
MoveFileA
DeleteFileA
GetSystemDirectoryA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
lstrcatA
GetLastError
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
ReleaseMutex
user32
PostThreadMessageA
wsprintfA
GetInputState
GetMessageA
advapi32
GetLengthSid
StartServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
GetUserNameA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
AddAce
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
OpenServiceA
msvcrt
_acmdln
_except_handler3
strchr
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_strcmpi
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
netapi32
NetUserGetLocalGroups
NetApiBufferFree
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gq0 Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
������~1.EXE.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
M6yBf2cT Size: - Virtual size: 732KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Dd2P1qVE Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
6cpy2vjY Size: 496KB - Virtual size: 500KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
mDIWxcak Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iMkVxfBK Size: 24B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IE9fFW12 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Buuqix2x Size: 24B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ