Static task
static1
Behavioral task
behavioral1
Sample
4af7f6c03aa3a69e9c306e156e954bb3f3e64183ec554d1da68a8a7d6f42a1e9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4af7f6c03aa3a69e9c306e156e954bb3f3e64183ec554d1da68a8a7d6f42a1e9.exe
Resource
win10v2004-20220812-en
General
-
Target
4af7f6c03aa3a69e9c306e156e954bb3f3e64183ec554d1da68a8a7d6f42a1e9
-
Size
96KB
-
MD5
a6c6f48b3ce9d245ebb93238269e6bc5
-
SHA1
e34732b3d67a0ace6bf2b78a7483254441cfbde5
-
SHA256
4af7f6c03aa3a69e9c306e156e954bb3f3e64183ec554d1da68a8a7d6f42a1e9
-
SHA512
6e0cd1ccec8fcb0921a35d2ec7fb1ae7e25130df483aad7cf0366d3221a39dac2bf1d0cc0f65893ae641f826094434b54fe7e9045c0b0367b0c9f1300329e60c
-
SSDEEP
1536:yZfXAgPmBQRgVX9ergBJf4CiJl0TkcGUAZU4F1WmuU50isCaeGoj:yZfXAwmCRMX9ergLf4Cs2TkcGUAN/Goj
Malware Config
Signatures
Files
-
4af7f6c03aa3a69e9c306e156e954bb3f3e64183ec554d1da68a8a7d6f42a1e9.exe windows x64
1e4db10099a98336fe15aa0094b09cac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegEnumKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCloseKey
RegQueryValueExW
RegEnumValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
kernel32
GetModuleHandleExW
ReleaseSemaphore
CreateSemaphoreExW
GetModuleFileNameA
FormatMessageW
WaitForSingleObject
ExpandEnvironmentStringsW
ReleaseMutex
GetFullPathNameW
CreateDirectoryW
GetFileAttributesW
LoadLibraryExW
FreeLibrary
GetProcessHeap
DeleteCriticalSection
GetProcAddress
HeapAlloc
CloseHandle
OutputDebugStringW
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
DebugBreak
IsDebuggerPresent
lstrcmpiW
LocalFree
GetLastError
GetCommandLineW
WritePrivateProfileStringW
LocalAlloc
Sleep
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
HeapFree
SetLastError
EnterCriticalSection
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
msvcrt
_vsnprintf
wcsrchr
wcschr
memcpy_s
wcspbrk
iswalpha
_onexit
__dllonexit
_unlock
_lock
?terminate@@YAXXZ
_commode
_fmode
_acmdln
__C_specific_handler
_initterm
__setusermatherr
_ismbblead
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
free
_callnewh
malloc
wcsncmp
_wcsnicmp
_itow_s
iswspace
_vsnwprintf
memset
shell32
SHGetFolderPathW
CommandLineToArgvW
shlwapi
ord158
StrCmpW
StrChrW
user32
LoadStringW
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
RtlAllocateHeap
RtlFreeHeap
api-ms-win-core-com-l1-1-0
CoCreateGuid
StringFromGUID2
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ