Static task
static1
Behavioral task
behavioral1
Sample
975629358bfbba0344ef0dae4d22697ceb2a32b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
975629358bfbba0344ef0dae4d22697ceb2a32b4.exe
Resource
win10v2004-20220901-en
General
-
Target
975629358bfbba0344ef0dae4d22697ceb2a32b4
-
Size
141KB
-
MD5
62ce5400d0e61d028b180e37756f35d2
-
SHA1
975629358bfbba0344ef0dae4d22697ceb2a32b4
-
SHA256
06a3c5b5f348b42acd769b18376f7f11fdee4ac07ecb4dcec0fcebda0150d456
-
SHA512
a86ca6280ccdc1e997835f2c539452a9cca31273c53d9833570729ef1c6aba9b20ce2c6d7ed198baa622bc3bc2c528d035d906d06ad4e62d809de7cf2ff60cfc
-
SSDEEP
3072:sZIO0N9cVkNghbBBKO+mXjpxtAhLcxuSKwB8PNYNAB:sW1sug/Bj+IjpWLcx/K4YiNAB
Malware Config
Signatures
Files
-
975629358bfbba0344ef0dae4d22697ceb2a32b4.exe windows x86
ccd44fef8410f88163c2ffe24d2e6347
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
VirtualProtect
rtutils
TraceVprintfExA
LogEventW
RouterLogEventW
RouterLogEventStringW
pdh
PdhGetCounterInfoW
PdhOpenLogW
PdhAddCounterW
PdhGetRawCounterValue
PdhParseCounterPathW
rpcrt4
RpcBindingInqObject
RpcAsyncCancelCall
UuidEqual
mswsock
SetServiceA
AcceptEx
GetServiceA
s_perror
resutils
ClusWorkerCheckTerminate
ResUtilGetDwordValue
ResUtilSetDwordValue
ole32
DoDragDrop
CoGetCurrentLogicalThreadId
OleNoteObjectVisible
SNB_UserMarshal
StgGetIFillLockBytesOnFile
HMENU_UserMarshal
OleLockRunning
SetDocumentBitStg
netapi32
NetShareAdd
I_NetServerPasswordGet
NetShareCheck
NetAuditRead
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ