Static task
static1
Behavioral task
behavioral1
Sample
a4b0af47a4499419ce2cef7cb0e694e62ca706083fb96147b3fef59c93eafded.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4b0af47a4499419ce2cef7cb0e694e62ca706083fb96147b3fef59c93eafded.exe
Resource
win10v2004-20220901-en
General
-
Target
a4b0af47a4499419ce2cef7cb0e694e62ca706083fb96147b3fef59c93eafded
-
Size
360KB
-
MD5
35776f816fbb814c179e7b3f56f4945f
-
SHA1
a9df07cc091772cbe3861088bf78fd231f7aee8e
-
SHA256
a4b0af47a4499419ce2cef7cb0e694e62ca706083fb96147b3fef59c93eafded
-
SHA512
df2104672b7ec7667d90ca16dc957cede78234be9f4d2aad71f5fbf32379023c32f6d0da53614107d5360de72383eb78bc974af90b75f8d7e3516e7cf6d16063
-
SSDEEP
6144:2cIM8URP3T4IZgMo79TY0veNOoNj2IY2VG:0qUCPfjtY20
Malware Config
Signatures
Files
-
a4b0af47a4499419ce2cef7cb0e694e62ca706083fb96147b3fef59c93eafded.exe windows x86
29b0f1fcabcd11f3130ac63d73ad3706
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
WaitForSingleObject
lstrcpyW
GetLocalTime
GetSystemDirectoryW
CreateFileW
DeviceIoControl
GetDriveTypeW
CreateEventW
CreateThread
SetEvent
Sleep
SetFileAttributesW
GetModuleFileNameW
CopyFileW
GetTempFileNameW
GetTempPathW
lstrcpynW
FindClose
FindFirstFileW
FindNextFileW
SystemTimeToFileTime
GetFileSize
FileTimeToSystemTime
GetACP
lstrlenA
lstrcatW
MultiByteToWideChar
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
ResumeThread
SuspendThread
GetModuleHandleW
OpenProcess
LockResource
LoadResource
SizeofResource
FindResourceW
EndUpdateResourceA
UpdateResourceW
BeginUpdateResourceW
GetTickCount
CreateEventA
GetSystemTime
CreateDirectoryW
GetComputerNameW
GetVersionExW
GetCommandLineW
CreateProcessW
GetFileAttributesW
lstrcmpiW
lstrlenW
WideCharToMultiByte
CreateFileA
GetFileInformationByHandle
CloseHandle
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetFileAttributesA
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleFileNameA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
FlushFileBuffers
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
HeapAlloc
HeapFree
GetFileType
GetLastError
ReadFile
WriteFile
SetFilePointer
DeleteFileA
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetStdHandle
SetEndOfFile
SetHandleCount
GetStdHandle
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
user32
LookupIconIdFromDirectoryEx
GetClassNameA
SendMessageA
FindWindowExA
GetSystemMetrics
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
DeleteService
ControlService
OpenServiceW
QueryServiceStatusEx
StartServiceW
OpenSCManagerW
CreateServiceW
CloseServiceHandle
ChangeServiceConfig2W
CreateProcessAsUserW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegSetValueExW
shell32
CommandLineToArgvW
SHGetFolderPathW
SHGetFileInfoW
ShellExecuteW
shlwapi
PathFileExistsW
ole32
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoInitializeSecurity
CoInitializeEx
oleaut32
SysAllocString
VariantInit
VariantClear
SysFreeString
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 158KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jidfyqb Size: 80KB - Virtual size: 156KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE