Static task
static1
Behavioral task
behavioral1
Sample
9899355a0f64cf463c81eb18b5ac77b70ebc4d04e7b77d257b5c1a49124e64e4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9899355a0f64cf463c81eb18b5ac77b70ebc4d04e7b77d257b5c1a49124e64e4.exe
Resource
win10v2004-20220901-en
General
-
Target
9899355a0f64cf463c81eb18b5ac77b70ebc4d04e7b77d257b5c1a49124e64e4
-
Size
243KB
-
MD5
8d2e201ec753a5ccecb467b032b28911
-
SHA1
87737f81a74f90e1c975d23c2bc9b61d1b7cc5c5
-
SHA256
9899355a0f64cf463c81eb18b5ac77b70ebc4d04e7b77d257b5c1a49124e64e4
-
SHA512
fe8f878b1ba0145f67c87e0b593eb6b83e28f04e697a5b2144096bd9e51713df06d6ced52b70d3365d8efb9bb3f10de9fe8a2515ccf9cc1ad8d2c8ffcad9e507
-
SSDEEP
6144:lin+DskApPicO5MJmjLED/cyhZ4eU82wn:lin+Dtw6cOemehHU82O
Malware Config
Signatures
Files
-
9899355a0f64cf463c81eb18b5ac77b70ebc4d04e7b77d257b5c1a49124e64e4.exe windows x86
096b085d1d9d59c40b0baef8d1e94bfc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CloseServiceHandle
StartServiceW
ControlService
QueryServiceStatus
OpenServiceW
CreateServiceW
OpenSCManagerW
DeleteService
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
CreateProcessAsUserW
AdjustTokenPrivileges
SetTokenInformation
DuplicateTokenEx
LookupPrivilegeValueW
OpenProcessToken
kernel32
GetLocalTime
lstrcpyW
SetFileAttributesW
DeleteFileW
CloseHandle
WaitForSingleObject
CreateProcessW
lstrcatW
GetSystemDirectoryW
CopyFileW
GetProcAddress
LoadLibraryW
GetModuleFileNameW
lstrlenA
WriteFile
ReadFile
GetFileSize
CreateFileW
GetTempFileNameW
GetTempPathW
lstrcmpiW
lstrlenW
GetComputerNameW
MultiByteToWideChar
GetACP
GetDriveTypeW
Sleep
RemoveDirectoryW
GetFileAttributesW
FindClose
FindNextFileW
FindFirstFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
FreeLibrary
LockResource
LoadResource
FindResourceW
EndUpdateResourceW
UpdateResourceW
SizeofResource
GetLastError
BeginUpdateResourceW
SystemTimeToFileTime
GetFileTime
lstrcpynW
GetWindowsDirectoryW
CreateDirectoryW
DeviceIoControl
GetDiskFreeSpaceW
GetModuleHandleW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
WideCharToMultiByte
GetVersionExW
lstrcmpW
TerminateThread
SetEvent
FindNextChangeNotification
FindCloseChangeNotification
WaitForMultipleObjects
FindFirstChangeNotificationW
GetCommandLineW
GetCurrentThreadId
CreateThread
CreateEventW
GetStartupInfoW
GetVersionExA
GetTimeFormatA
GetDateFormatA
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetTimeZoneInformation
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
SetFilePointer
LoadLibraryA
SetStdHandle
FlushFileBuffers
RtlUnwind
SetEndOfFile
GetProcessHeap
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
CompareStringA
GetCPInfo
CompareStringW
GetOEMCP
SetEnvironmentVariableA
GetLocaleInfoA
user32
ShowWindow
CreateWindowExW
DispatchMessageW
TranslateMessage
GetMessageW
GetForegroundWindow
PostThreadMessageW
GetInputState
RegisterClassExW
LoadCursorW
SendMessageW
FindWindowExW
GetClassNameW
PostQuitMessage
LookupIconIdFromDirectoryEx
DefWindowProcW
GetSystemMetrics
shlwapi
PathFileExistsW
shell32
ShellExecuteW
SHGetFolderPathW
SHFileOperationW
CommandLineToArgvW
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ