Static task
static1
Behavioral task
behavioral1
Sample
bb517999519c18dbf05b2dd9e54653ae0c177c4b8d0d9ae72a939f793fc8f580.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb517999519c18dbf05b2dd9e54653ae0c177c4b8d0d9ae72a939f793fc8f580.exe
Resource
win10v2004-20221111-en
General
-
Target
bb517999519c18dbf05b2dd9e54653ae0c177c4b8d0d9ae72a939f793fc8f580
-
Size
84KB
-
MD5
529005ae7947d6bbb48c3aba606386a3
-
SHA1
23377438146a7cb5dcaf7e7a88aa52e0d39b7598
-
SHA256
bb517999519c18dbf05b2dd9e54653ae0c177c4b8d0d9ae72a939f793fc8f580
-
SHA512
ebea3addfe56a89dc3b19d75570b9208dd9c3d1b760e6b1490af69ea4edc84bf3d38e683cb6230f2cfc9a8160dbe538f6b6b20931c39f02688cb73297d227c3b
-
SSDEEP
1536:iCotZM7Q7a/2o23C4RiIzdPkdAT5Tv0SynP:wJdPkdAT570S0P
Malware Config
Signatures
Files
-
bb517999519c18dbf05b2dd9e54653ae0c177c4b8d0d9ae72a939f793fc8f580.exe windows x86
5b7afc2e17977d2ae155f0eeb9559c3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegNotifyChangeKeyValue
OpenSCManagerA
OpenServiceA
CloseServiceHandle
StartServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegisterEventSourceA
ReportEventA
DeregisterEventSource
CreateServiceA
ControlService
QueryServiceStatus
DeleteService
ConvertStringSecurityDescriptorToSecurityDescriptorA
InitializeSecurityDescriptor
kernel32
SetFilePointer
CreateThread
SetThreadPriority
ResumeThread
GetModuleHandleA
GetModuleFileNameA
lstrlenA
SetEvent
WaitForSingleObject
CloseHandle
Sleep
WriteFile
CreateFileA
GetLastError
CreateEventA
WaitForMultipleObjects
GetLocalTime
GetDateFormatA
GetTimeFormatA
MultiByteToWideChar
SetConsoleCtrlHandler
FormatMessageA
LocalFree
CreateNamedPipeA
ResetEvent
ConnectNamedPipe
ReadFile
GetOverlappedResult
DisconnectNamedPipe
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
HeapFree
HeapReAlloc
HeapAlloc
GetProcAddress
ExitProcess
GetCommandLineA
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapSize
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetStdHandle
LoadLibraryA
InitializeCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
Sections
.text Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ