Static task
static1
Behavioral task
behavioral1
Sample
884de3e7539228466f14c5e66edc0f64824592cdb07c5807abd6829998088e64.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
884de3e7539228466f14c5e66edc0f64824592cdb07c5807abd6829998088e64.exe
Resource
win10v2004-20221111-en
General
-
Target
884de3e7539228466f14c5e66edc0f64824592cdb07c5807abd6829998088e64
-
Size
212KB
-
MD5
61d2d7ac38e9c38f817561d035ef7793
-
SHA1
0bea6ff15ff1dc264cf7e0b70d2f1521411ff279
-
SHA256
884de3e7539228466f14c5e66edc0f64824592cdb07c5807abd6829998088e64
-
SHA512
29b902535f1877e0f6c710b46afad0fc45d0cb5fc3fd981d4336b0f04a6f49b598af0fa8691a5b9ab8deed6de7807d64352c9aed4540a889da8641219fa9170a
-
SSDEEP
3072:StRD/cLAU7LIfiRWcBXVyE/XeyVvZdTSDXeyJehZx:sRjmD7sfqhD/cyhZx
Malware Config
Signatures
Files
-
884de3e7539228466f14c5e66edc0f64824592cdb07c5807abd6829998088e64.exe windows x86
64d8178533d1a7cecfc9d33bd7f5640a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSaveKeyW
CloseServiceHandle
StartServiceW
ControlService
QueryServiceStatus
OpenServiceW
CreateServiceW
OpenSCManagerW
DeleteService
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
CreateProcessAsUserW
AdjustTokenPrivileges
SetTokenInformation
DuplicateTokenEx
LookupPrivilegeValueW
OpenProcessToken
kernel32
GetLocalTime
lstrcpyW
SetFileAttributesW
DeleteFileW
CloseHandle
WaitForSingleObject
CreateProcessW
lstrcatW
GetSystemDirectoryW
CopyFileW
GetProcAddress
LoadLibraryW
GetModuleFileNameW
lstrlenA
WriteFile
ReadFile
GetFileSize
CreateFileW
GetTempFileNameW
GetTempPathW
lstrcmpiW
lstrlenW
GetComputerNameW
MultiByteToWideChar
GetACP
GetDriveTypeW
Sleep
RemoveDirectoryW
GetFileAttributesW
FindClose
FindNextFileW
FindFirstFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
FreeLibrary
LockResource
LoadResource
FindResourceW
EndUpdateResourceW
UpdateResourceW
SizeofResource
GetLastError
BeginUpdateResourceW
SystemTimeToFileTime
GetFileTime
lstrcpynW
GetWindowsDirectoryW
CreateDirectoryW
DeviceIoControl
GetDiskFreeSpaceW
GetModuleHandleW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
WideCharToMultiByte
GetVersionExW
GetVolumeInformationW
lstrcmpW
TerminateThread
SetEvent
FindNextChangeNotification
FindCloseChangeNotification
WaitForMultipleObjects
FindFirstChangeNotificationW
GetCommandLineW
GetCurrentThreadId
CreateThread
CreateEventW
GetStartupInfoW
GetVersionExA
GetTimeFormatA
GetDateFormatA
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetTimeZoneInformation
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
SetFilePointer
LoadLibraryA
SetStdHandle
FlushFileBuffers
RtlUnwind
SetEndOfFile
GetProcessHeap
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
CompareStringA
GetCPInfo
CompareStringW
GetOEMCP
SetEnvironmentVariableA
GetLocaleInfoA
user32
ShowWindow
CreateWindowExW
DispatchMessageW
TranslateMessage
GetMessageW
GetForegroundWindow
PostThreadMessageW
GetInputState
RegisterClassExW
LoadCursorW
SendMessageW
FindWindowExW
GetClassNameW
PostQuitMessage
LookupIconIdFromDirectoryEx
DefWindowProcW
GetSystemMetrics
shlwapi
PathFileExistsW
shell32
ShellExecuteW
SHGetFolderPathW
SHFileOperationW
CommandLineToArgvW
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ