Static task
static1
Behavioral task
behavioral1
Sample
96b77c74776ce80dde1bfabdbb67723ccf770efca58e7c6acddaa67ca11e6775.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96b77c74776ce80dde1bfabdbb67723ccf770efca58e7c6acddaa67ca11e6775.exe
Resource
win10v2004-20220812-en
General
-
Target
96b77c74776ce80dde1bfabdbb67723ccf770efca58e7c6acddaa67ca11e6775
-
Size
48KB
-
MD5
36ab8582c815d4a36056e5097de105e7
-
SHA1
7373be2838c6fe129ad93c3f20976c7767fa5715
-
SHA256
96b77c74776ce80dde1bfabdbb67723ccf770efca58e7c6acddaa67ca11e6775
-
SHA512
5767835bb50bb17a0a2b1f78f5997d36c2adc55872972ecaf1c40cc739df084cc5f1434fdd4337183629b921eec831064a11c38617ad60c23415f7162cd7941e
-
SSDEEP
768:fOFT4hx6/jEQgkTwQVWyK4SFJG7z9b1mIdoCFMA6cRVPAHkfShlw4D33vNE:fDxO+kTwQVCGf9bsd/Q8Hdvw4T+
Malware Config
Signatures
Files
-
96b77c74776ce80dde1bfabdbb67723ccf770efca58e7c6acddaa67ca11e6775.exe windows x86
20e41ce01f80755f4eea7fc12deb3017
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
ZwReadFile
ZwQueryInformationFile
strrchr
ZwCreateFile
ZwWriteFile
ZwQueryVolumeInformationFile
ZwQueryDirectoryFile
wcslen
ZwSetInformationFile
RtlAdjustPrivilege
RtlIpv4StringToAddressA
ZwOpenThreadTokenEx
_wcsicmp
strcmp
strcpy
sprintf
memcmp
strchr
ZwSetSecurityObject
LdrAccessResource
wcsrchr
swprintf
strlen
RtlDestroyQueryDebugBuffer
RtlQueryProcessDebugInformation
RtlCreateQueryDebugBuffer
RtlEqualUnicodeString
ZwQuerySystemInformation
ZwSuspendThread
ZwQueryInformationThread
ZwOpenThread
_stricmp
RtlNtStatusToDosError
RtlIpv4AddressToStringA
ZwClose
ZwEnumerateKey
ZwOpenKey
ZwQueryKey
ZwResumeThread
ZwLoadDriver
ZwCreateSymbolicLinkObject
ZwUnmapViewOfSection
ZwFlushVirtualMemory
RtlImageNtHeader
ZwMapViewOfSection
ZwCreateSection
ZwFsControlFile
ZwOpenFile
ZwSetValueKey
ZwCreateKey
LdrFindResource_U
RtlInitUnicodeString
ZwAdjustPrivilegesToken
memset
RtlIpv4StringToAddressW
ZwQueryValueKey
ZwImpersonateThread
memcpy
kernel32
DeleteTimerQueueTimer
Sleep
GetVersion
ExitProcess
GetTickCount
CreateTimerQueueTimer
VirtualAlloc
GetSystemTimeAsFileTime
GetLastError
BindIoCompletionCallback
LocalFree
LocalAlloc
advapi32
MD5Update
MD5Final
MD5Init
ws2_32
WSACleanup
WSARecvFrom
WSASendTo
setsockopt
WSASend
WSARecv
WSAIoctl
bind
closesocket
WSAGetLastError
WSASocketW
WSAStartup
cabinet
ord20
ord22
ord23
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 432B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ