Static task
static1
Behavioral task
behavioral1
Sample
a59e8dd05960171f7c62edcb74f01c8bdb3a4218758e08340e798f58f6062699.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a59e8dd05960171f7c62edcb74f01c8bdb3a4218758e08340e798f58f6062699.exe
Resource
win10v2004-20220901-en
General
-
Target
a59e8dd05960171f7c62edcb74f01c8bdb3a4218758e08340e798f58f6062699
-
Size
137KB
-
MD5
4a82ef748c24537dec4e04c9f42038e0
-
SHA1
2a4c39ff7bee76c11fbe6db3c784b66a1bea21ec
-
SHA256
a59e8dd05960171f7c62edcb74f01c8bdb3a4218758e08340e798f58f6062699
-
SHA512
d93837c0e4df43e757fda62919c155d9a0c39c6fba54283b2d36b35dadf680ed7130da68018e889f500582adc459d6b2f3528752b1f8657135a528343e764bb8
-
SSDEEP
3072:p+wJWH5sgRwu1JfOyDUh66HlNTRrLtziaWGaXkPUuHBwJ:AwJWHnZJfOy4hVHj914YTA
Malware Config
Signatures
Files
-
a59e8dd05960171f7c62edcb74f01c8bdb3a4218758e08340e798f58f6062699.exe windows x86
1a6d0f0a9c3c18182cdb582a233db220
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
sohdsdll
??0DeviceSearcher@@QAE@XZ
??1DeviceSearcher@@QAE@XZ
?StartSearch@DeviceSearcher@@QAEJPAV_IDeviceSearcherEvent@@@Z
?CheckDeviceConnection@DeviceSearcher@@QAEJPB_W@Z
?PolingDiscovery@DeviceSearcher@@QAEXXZ
?StopSearch@DeviceSearcher@@QAEJXZ
kernel32
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetCommandLineW
SetEvent
CreateEventW
CreateThread
GetCurrentThreadId
GetModuleHandleW
Sleep
WaitForSingleObject
CloseHandle
GetLastError
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
lstrlenW
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetStartupInfoW
user32
LoadStringW
CharNextW
CharUpperW
MessageBoxW
TranslateMessage
DispatchMessageW
GetMessageW
UnregisterClassA
PostThreadMessageW
advapi32
ChangeServiceConfigW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
DeregisterEventSource
ReportEventW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
RegDeleteValueW
ControlService
DeleteService
CreateServiceW
SetServiceStatus
RegisterEventSourceW
ole32
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoSuspendClassObjects
CoResumeClassObjects
CoCreateInstance
CoDisconnectObject
oleaut32
SysStringLen
SysAllocString
VariantInit
LoadTypeLi
LoadRegTypeLi
SysFreeString
VariantClear
atl80
ord30
ord31
ord58
ord32
ord18
ord22
ord64
ord17
ord20
ord23
ord61
msvcr80
_vsnwprintf_s
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
??3@YAXPAX@Z
??_V@YAXPAX@Z
_purecall
free
_CxxThrowException
??_U@YAPAXI@Z
__CxxFrameHandler3
??2@YAPAXI@Z
_recalloc
calloc
memset
malloc
_resetstkoflw
wcscpy_s
_putws
_controlfp_s
_except_handler4_common
?terminate@@YAXXZ
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
msvcp80
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.srdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE