Static task
static1
Behavioral task
behavioral1
Sample
d775b9d14cd4526b3db7d8dce2a95f05ee399b9abaea743b9930cf99621541c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d775b9d14cd4526b3db7d8dce2a95f05ee399b9abaea743b9930cf99621541c5.exe
Resource
win10v2004-20220812-en
General
-
Target
d775b9d14cd4526b3db7d8dce2a95f05ee399b9abaea743b9930cf99621541c5
-
Size
481KB
-
MD5
707f3e3d0b76793971ffab79a6ce6f77
-
SHA1
ec40677108f7c4a260cef7aef41b7bbab65d9189
-
SHA256
d775b9d14cd4526b3db7d8dce2a95f05ee399b9abaea743b9930cf99621541c5
-
SHA512
7095b5a37d6c41c09fba14dc5f722890dd9de1b4d681411662d0329a9653420190962f28ccebf94fd95714324c472fe7d108bbd5ce1fef2788713adfd6c00a40
-
SSDEEP
12288:wavINkG0UW7J+70BBhJV0FZpDQc4Ud/u:wa+dcdV0XpDQc4
Malware Config
Signatures
Files
-
d775b9d14cd4526b3db7d8dce2a95f05ee399b9abaea743b9930cf99621541c5.exe windows x86
a18a68014bb0833d57bde5a2d5f92365
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_purecall
wcsrchr
_vsnwprintf
swprintf
wcslen
wcsncmp
wcscpy
_onexit
wcscmp
wcstoul
_wcslwr
_wcsicmp
wcscat
wcsncpy
_wcsnicmp
swscanf
free
_initterm
malloc
_adjust_fdiv
__dllonexit
_except_handler3
wcschr
kernel32
GetLastError
lstrcpynW
lstrcmpiW
GetCurrentThread
WaitForSingleObject
CreateThread
CreateEventW
lstrcmpW
DeleteFileW
CopyFileW
lstrcatW
GetTempPathW
FileTimeToSystemTime
CompareFileTime
GetSystemTime
FindClose
FindFirstFileW
CloseHandle
ResetEvent
SetEvent
DisableThreadLibraryCalls
GetSystemDefaultLangID
WriteFile
SetEndOfFile
CreateFileW
InitializeCriticalSection
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
FindNextFileW
GetSystemDirectoryW
GetSystemInfo
GetComputerNameW
GetProcAddress
LoadLibraryW
FreeLibrary
MoveFileExW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FreeLibraryAndExitThread
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MoveFileW
GetFileAttributesExW
ExpandEnvironmentStringsW
SetFilePointer
OutputDebugStringW
GetLocalTime
FormatMessageW
lstrlenW
GetUserDefaultLCID
InterlockedDecrement
InterlockedIncrement
IsBadWritePtr
IsBadStringPtrW
IsBadReadPtr
SystemTimeToFileTime
GetFileSize
ReadFile
CompareStringW
lstrcpyW
LocalFree
LocalAlloc
DebugBreak
GetVersionExW
userenv
GetAppliedGPOListW
ForceSyncFgPolicy
RsopSetPolicySettingStatus
RsopAccessCheckByType
EnterCriticalPolicySection
LeaveCriticalPolicySection
RsopResetPolicySettingStatus
FreeGPOListW
advapi32
DuplicateTokenEx
ImpersonateLoggedOnUser
RegOpenCurrentUser
RevertToSelf
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
OpenThreadToken
EqualSid
OpenProcessToken
GetTokenInformation
CopySid
OpenEventLogW
ReportEventW
CloseEventLog
ConvertStringSidToSidW
ConvertSidToStringSidW
CheckTokenMembership
GetUserNameW
DuplicateToken
RegEnumKeyW
AddAccessAllowedAce
GetAce
SetFileSecurityW
DeleteAce
RegisterServiceCtrlHandlerW
SetServiceStatus
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAceEx
InitializeSecurityDescriptor
RegDeleteValueW
FreeSid
SetSecurityDescriptorDacl
RegDeleteKeyW
RegCreateKeyExW
rpcrt4
RpcRaiseException
I_RpcBindingInqTransportType
RpcImpersonateClient
RpcServerRegisterIfEx
RpcServerUseProtseqEpW
RpcServerUnregisterIf
UuidCreate
NdrServerCall2
Sections
0 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.4Q3l3 Size: 440KB - Virtual size: 439KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ