Static task
static1
Behavioral task
behavioral1
Sample
92106921be155a4979ecb5088ad601b3c756dc9bc57f08e4730fd62ad13749ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92106921be155a4979ecb5088ad601b3c756dc9bc57f08e4730fd62ad13749ac.exe
Resource
win10v2004-20221111-en
General
-
Target
92106921be155a4979ecb5088ad601b3c756dc9bc57f08e4730fd62ad13749ac
-
Size
53KB
-
MD5
96a3364ed8325d48ace11918d3446cad
-
SHA1
49356804e420ef47ce644837594c6b91d873ef2f
-
SHA256
92106921be155a4979ecb5088ad601b3c756dc9bc57f08e4730fd62ad13749ac
-
SHA512
2d4650f8c4d9cb47e3b6c3208eac9726d0b17087134be171d4101de84acd6a741e2cc50532cbc74a19a4350166acd9286e07d0258a70ed134ee80492fa113484
-
SSDEEP
768:Hr6teU2xd/u6ZE09RO4fm44LzkP5ND9QAHlcQaUQmTTr:Hr6cxLu0a4WaHCAgUxTT
Malware Config
Signatures
Files
-
92106921be155a4979ecb5088ad601b3c756dc9bc57f08e4730fd62ad13749ac.exe windows x86
93fac2721a831a46174b9afde4768628
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrIA
netapi32
NetUserGetInfo
kernel32
GetTempPathA
CreateFileA
WriteFile
GetSystemDirectoryA
lstrcatA
GetModuleFileNameA
lstrlenA
MapViewOfFile
UnmapViewOfFile
WaitForSingleObject
CreateRemoteThread
GetProcAddress
CreateFileMappingA
GetExitCodeThread
GetModuleHandleA
GetCurrentProcessId
VirtualAlloc
FindResourceA
FreeResource
LoadResource
GetVersion
LockResource
GetSystemDirectoryW
GetExitCodeProcess
MultiByteToWideChar
GetLastError
OpenMutexA
lstrcatW
CreateMutexA
lstrcpyW
DeleteFileA
lstrcpyA
ExitProcess
Sleep
LoadLibraryA
GetShortPathNameA
CloseHandle
GetVolumeInformationA
OpenProcess
GetTickCount
GetCurrentProcess
VirtualFree
SizeofResource
user32
wsprintfA
GetWindowThreadProcessId
FindWindowA
advapi32
RegQueryValueExA
RegSetValueExA
InitiateSystemShutdownExA
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyA
RegCloseKey
GetTokenInformation
LookupPrivilegeValueA
GetUserNameW
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zxjudne Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE