Static task
static1
Behavioral task
behavioral1
Sample
b812a3c2579d9fcfceb0b8a46139b1e482341c9697c310559431e48283cfc57a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b812a3c2579d9fcfceb0b8a46139b1e482341c9697c310559431e48283cfc57a.exe
Resource
win10v2004-20220812-en
General
-
Target
b812a3c2579d9fcfceb0b8a46139b1e482341c9697c310559431e48283cfc57a
-
Size
2.4MB
-
MD5
4c3794a01032b137d444dcf143525b1d
-
SHA1
8ae1b4d6b844940c272e84fe72372ac64c07d142
-
SHA256
b812a3c2579d9fcfceb0b8a46139b1e482341c9697c310559431e48283cfc57a
-
SHA512
f1976580e372a7d95c42391ef1c214f442a2d8227b84572082443c0b9077e5ef2f1b761b98e1c241280591145472da503185cd7d90b91c45d4d4b0dde4e2f873
-
SSDEEP
49152:rJfNY3UBFgoOf1e/tQd7936FDE09PyJSvjC9rjENmPZk:rlNY3UBFgPfMFDMJS
Malware Config
Signatures
Files
-
b812a3c2579d9fcfceb0b8a46139b1e482341c9697c310559431e48283cfc57a.exe windows x86
2ea3fd5a2c171424468a34aa26e8bdad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyW
PathFileExistsW
kernel32
CreateDirectoryW
SetFileAttributesW
DecodePointer
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetFileSize
ReadFile
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
lstrcpyW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
GetExitCodeProcess
GetCurrentThreadId
WaitForSingleObject
Sleep
GetLogicalDriveStringsW
GetModuleHandleW
CreateProcessW
QueryDosDeviceW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WritePrivateProfileStringW
GetSystemInfo
GetTickCount
GetVersionExW
WinExec
GetPrivateProfileIntW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetEnvironmentVariableW
GetSystemTimeAsFileTime
InitializeSListHead
GetVolumeInformationW
ReleaseMutex
CreateMutexW
EnterCriticalSection
LeaveCriticalSection
DeviceIoControl
OutputDebugStringA
SetPriorityClass
OutputDebugStringW
RtlUnwind
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
SetStdHandle
FlushFileBuffers
WriteConsoleW
SetEndOfFile
SystemTimeToFileTime
GetSystemTime
ReadConsoleA
SetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
VerSetConditionMask
ExpandEnvironmentStringsA
PeekNamedPipe
WaitForMultipleObjects
SleepEx
InitializeCriticalSection
FormatMessageA
GetLongPathNameW
GetCurrentProcess
GetModuleFileNameW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitThread
FreeLibraryAndExitThread
GetCurrentDirectoryW
GetFullPathNameW
GetCurrentProcessId
CopyFileW
GetPrivateProfileStringW
TerminateProcess
OpenProcess
GetTempPathW
CreateThread
lstrlenW
MoveFileExW
FindNextFileW
FindFirstFileW
DeleteFileW
RemoveDirectoryW
FindClose
GetSystemDirectoryW
LoadLibraryW
CloseHandle
GetProcAddress
FreeLibrary
QueryPerformanceCounter
advapi32
ReportEventW
RegisterEventSourceW
DeregisterEventSource
RevertToSelf
ImpersonateLoggedOnUser
OpenProcessToken
GetTokenInformation
SetTokenInformation
InitializeSecurityDescriptor
LookupAccountNameW
GetFileSecurityW
SetFileSecurityW
GetSecurityDescriptorDacl
GetSecurityDescriptorControl
AddAccessAllowedAce
GetAce
AddAce
GetAclInformation
InitializeAcl
GetLengthSid
EqualSid
RegSetValueW
RegOpenKeyW
DuplicateTokenEx
RegCloseKey
RegCreateKeyW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
CloseServiceHandle
ControlService
DeleteService
OpenSCManagerW
OpenServiceW
QueryServiceStatus
RegCreateKeyExW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExA
RegEnumKeyW
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
CreateProcessAsUserW
LookupAccountSidW
SetSecurityDescriptorDacl
shell32
SHFileOperationW
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteExW
user32
GetUserObjectInformationW
GetProcessWindowStation
wsprintfW
LoadStringW
MessageBoxW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
crypt32
CryptQueryObject
CertGetNameStringW
CertFreeCertificateContext
CertFindCertificateInStore
CertCloseStore
CryptMsgGetParam
CryptMsgClose
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcessModules
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wldap32
ord143
ord211
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord46
ws2_32
WSAGetLastError
send
__WSAFDIsSet
WSACleanup
WSAStartup
select
WSASetLastError
bind
gethostname
ioctlsocket
listen
accept
sendto
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
setsockopt
socket
ntohs
htons
getsockname
closesocket
getpeername
recv
connect
getsockopt
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 530KB - Virtual size: 529KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ