Static task
static1
Behavioral task
behavioral1
Sample
a907c8216c7a3800623d551549db5bf5247ac4342556955d26b61317d99744af.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a907c8216c7a3800623d551549db5bf5247ac4342556955d26b61317d99744af.exe
Resource
win10v2004-20220901-en
General
-
Target
a907c8216c7a3800623d551549db5bf5247ac4342556955d26b61317d99744af
-
Size
172KB
-
MD5
1c0531b5434980995eb6534f5e51e4f9
-
SHA1
8f99b1e6aa6054a3fc9e2f1b23cacd91777db49a
-
SHA256
a907c8216c7a3800623d551549db5bf5247ac4342556955d26b61317d99744af
-
SHA512
babbf0c00e633962c7852ee60e85d2a537883bdd4a065091377e59621ac5ff85ec1efa701d30aa9eaf20f0ed4e59c880f70f2f1e0e04c02019577b223d9caf55
-
SSDEEP
3072:EGlaJv3sK7ttHIkrn7jed1enUsP7y0AGSSPrfnG8b/Ie8pu3jlU87wFlS/:Kv7ffr7jw2y0AGHLFb/I7pu3+9lS
Malware Config
Signatures
Files
-
a907c8216c7a3800623d551549db5bf5247ac4342556955d26b61317d99744af.exe windows x86
4d53707fa2f18c50d14e1023d64267d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
RpcImpersonateClient
RpcServerUnregisterIf
RpcServerListen
RpcServerRegisterIf
RpcServerUseProtseqEpA
RpcRaiseException
NdrConformantArrayMarshall
I_RpcGetBuffer
NdrConformantArrayBufferSize
NdrConformantArrayUnmarshall
NdrConvert
RpcRevertToSelf
NdrServerInitializeNew
advapi32
GetTokenInformation
SetKernelObjectSecurity
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetLengthSid
CopySid
LookupPrivilegeValueA
AdjustTokenPrivileges
IsValidSid
OpenProcessToken
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
AllocateAndInitializeSid
FreeSid
LookupAccountSidW
RegSetKeySecurity
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegEnumKeyExA
OpenThreadToken
GetUserNameA
AllocateLocallyUniqueId
RegSetValueExW
RevertToSelf
ImpersonateLoggedOnUser
LogonUserW
CreateProcessAsUserW
SetTokenInformation
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
RegQueryValueExW
SetServiceStatus
kernel32
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
SetEndOfFile
ReadFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapAlloc
CreateEventA
CloseHandle
SetEvent
GetVersion
Sleep
TerminateProcess
GetCurrentProcess
WaitForMultipleObjects
TerminateThread
WaitForSingleObject
GetLastError
ReadProcessMemory
OpenProcess
lstrcmpiA
lstrcmpiW
GetCurrentThread
FreeLibrary
GetProcAddress
LoadLibraryA
SetLastError
GetExitCodeProcess
GetComputerNameW
CreateProcessA
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalFree
LocalAlloc
HeapFree
GetProcessHeap
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetSystemInfo
VirtualProtect
CreateFileA
SetStdHandle
SetFilePointer
IsBadCodePtr
GetCPInfo
GetOEMCP
GetACP
IsBadWritePtr
VirtualAlloc
VirtualQuery
GetCommandLineA
GetVersionExA
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
ExitProcess
ExitThread
GetCurrentThreadId
CreateThread
IsBadReadPtr
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
HeapReAlloc
HeapSize
FlushFileBuffers
GetTimeZoneInformation
InterlockedExchange
user32
SendMessageA
SetTimer
GetWindowLongA
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowLongA
CreateWindowExA
RegisterClassA
PostQuitMessage
KillTimer
wsprintfW
DefWindowProcA
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCancelConnection2W
WNetCloseEnum
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ