Static task
static1
Behavioral task
behavioral1
Sample
66b3a4dbb3cdfd77805642a6104996c8a806343728b4cc3b4676f7e089975042.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
66b3a4dbb3cdfd77805642a6104996c8a806343728b4cc3b4676f7e089975042.exe
Resource
win10v2004-20220901-en
General
-
Target
66b3a4dbb3cdfd77805642a6104996c8a806343728b4cc3b4676f7e089975042
-
Size
520KB
-
MD5
80835805d2e6f958e316a92786b0dc16
-
SHA1
4da51c232a204b1ba0b57ffa598f7a38df63e1fc
-
SHA256
66b3a4dbb3cdfd77805642a6104996c8a806343728b4cc3b4676f7e089975042
-
SHA512
f151d8670b32c3054982f2fab716cbd3a418376eb63c2cbf937810f61083a9077f5143ae2f7500abcf4bfc52206140bdbc7c3017b9b4e31794719e2b07a85474
-
SSDEEP
12288:MdyDRwpmFq6ITSebJWwjIdDbNSP4zkH4zkk:9CwF1ipbJWkIxEwkYkk
Malware Config
Signatures
Files
-
66b3a4dbb3cdfd77805642a6104996c8a806343728b4cc3b4676f7e089975042.exe windows x64
d0058544e4588b1b2290b7f4d830eb0a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
memset
memcpy
memcmp
_setjmp
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
_cexit
_exit
_XcptFilter
__C_specific_handler
__getmainargs
calloc
free
_wcslwr
qsort
_dup2
_dup
_close
_open_osfhandle
swscanf
_ultoa
_pipe
wcsncmp
_setmode
exit
iswxdigit
time
srand
_wtol
fflush
wcsstr
iswalpha
wcstoul
_errno
printf
rand
_iob
fprintf
wcsrchr
realloc
towlower
setlocale
_wcsupr
iswdigit
_wcsicmp
iswspace
wcschr
memmove
fgets
_pclose
ferror
feof
_wpopen
_wcsnicmp
_vsnwprintf
wcstol
_get_osfhandle
_getch
towupper
wcsspn
_tell
longjmp
_local_unwind
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlFreeHeap
NtFsControlFile
NtOpenThreadToken
NtClose
NtOpenProcessToken
NtQueryInformationToken
RtlDosPathNameToNtPathName_U
RtlFindLeastSignificantBit
NtSetInformationProcess
NtQueryInformationProcess
RtlNtStatusToDosError
kernel32
GetTimeFormatW
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
DelayLoadFailureHook
LoadLibraryExA
FreeLibrary
CreateHardLinkW
CreateSymbolicLinkW
GetVolumePathNameW
GetThreadLocale
ResumeThread
SetProcessAffinityMask
GetNumaNodeProcessorMaskEx
GetThreadGroupAffinity
FindFirstFileExW
GetDiskFreeSpaceExW
FindNextStreamW
FindFirstStreamW
DeviceIoControl
CompareFileTime
RemoveDirectoryW
GetCurrentDirectoryW
GetExitCodeProcess
WaitForSingleObject
TerminateProcess
SetCurrentDirectoryW
SetFileTime
DeleteFileW
SetEndOfFile
SetFileAttributesW
CopyFileW
CreateDirectoryW
SetConsoleTextAttribute
FillConsoleOutputAttribute
ScrollConsoleScreenBufferW
GetACP
FormatMessageW
FlushFileBuffers
DuplicateHandle
HeapSize
HeapReAlloc
VirtualAlloc
VirtualFree
HeapSetInformation
GetCurrentThreadId
OpenThread
GetFileAttributesExW
GetDriveTypeW
GetVersion
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameW
GetWindowsDirectoryW
SetConsoleCtrlHandler
InitializeCriticalSection
ExpandEnvironmentStringsW
CancelSynchronousIo
GetVolumeInformationW
GlobalFree
GlobalAlloc
SetFilePointerEx
WriteFile
SearchPathW
LocalFree
SetConsoleTitleW
MoveFileExW
MoveFileW
QueryFullProcessImageNameW
ReadProcessMemory
LoadLibraryW
RegSetValueExW
RegCreateKeyExW
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
VirtualQuery
CmdBatNotification
GetCPInfo
GetConsoleOutputCP
SetThreadLocale
GetProcAddress
GetModuleHandleW
CloseHandle
GetLastError
SetFilePointer
GetFullPathNameW
FindFirstFileW
FindNextFileW
FindClose
CreateFileW
ReadFile
MultiByteToWideChar
GetFileSize
WideCharToMultiByte
lstrcmpiW
lstrcmpW
GetStdHandle
FlushConsoleInputBuffer
HeapAlloc
GetProcessHeap
HeapFree
GetConsoleScreenBufferInfo
ReadConsoleW
SetConsoleCursorPosition
FillConsoleOutputCharacterW
WriteConsoleW
GetFileType
GetUserDefaultLCID
GetLocaleInfoW
SetLocalTime
GetSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatW
RegDeleteValueW
GetLocalTime
GetConsoleMode
SetConsoleMode
GetEnvironmentVariableW
GetCommandLineW
GetNumaHighestNodeNumber
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEnvironmentStringsW
GetConsoleTitleW
GetVDMCurrentDirectories
SetErrorMode
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
GetStartupInfoW
CreateProcessW
GetConsoleWindow
GetFileAttributesW
NeedCurrentDirectoryForExePathW
GetBinaryTypeW
RegOpenKeyExW
RegCloseKey
SetLastError
RegQueryValueExW
RegDeleteKeyExW
GetCurrentProcessId
winbrand
BrandingFormatString
Sections
.text Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ