Static task
static1
Behavioral task
behavioral1
Sample
53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08.exe
Resource
win10v2004-20230221-en
General
-
Target
53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08
-
Size
64KB
-
MD5
60c02f5b6c8cf50918027e14bf06b967
-
SHA1
3c9e9454ed02c02ccfc3f5240391c413da300b5f
-
SHA256
53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08
-
SHA512
c7f893883406065c78474af4541178bffec10f4a9847e15206c4012e68c87228029bc495fefb2ebdab77b16595d1969b8d85674b02a1c49f3f61b2281e39aa4f
-
SSDEEP
768:GnJ9uwtbJD/QpEdTrArzVpCK1w22TYgNvCJ037FLxZKQJRNz0TqXuEmLIu0L:G+wr1AB0AwB57F9npz0TauEm8u0L
Malware Config
Signatures
Files
-
53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08.exe windows x86
68b5e41a24d5a26c1c2196733789c238
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetCancelConnection2W
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
WNetAddConnection2W
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
activeds
ord9
user32
wsprintfW
advapi32
LookupAccountSidW
GetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetUserNameW
QueryServiceStatusEx
OpenServiceA
OpenSCManagerW
OpenSCManagerA
EnumServicesStatusA
StartServiceW
CryptDestroyKey
DeleteService
CreateServiceW
CryptAcquireContextW
CryptReleaseContext
CloseServiceHandle
CryptImportKey
CryptEncrypt
ControlService
ntdll
RtlGetNativeSystemInformation
RtlGetVersion
ZwQuerySystemInformation
shell32
ord680
CommandLineToArgvW
kernel32
GetComputerNameA
TerminateProcess
OpenProcess
lstrcmpiA
GetModuleFileNameW
GetTempPathW
CreateProcessW
GetSystemInfo
GlobalMemoryStatus
GetComputerNameW
DeleteFileW
CopyFileW
GetStdHandle
InitializeCriticalSection
ReleaseSemaphore
lstrlenA
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
WriteConsoleW
AllocConsole
DeleteCriticalSection
LeaveCriticalSection
HeapAlloc
GetProcessHeap
lstrcpyW
lstrcatW
lstrlenW
FindClose
FindFirstFileW
FindNextFileW
GetVolumeInformationW
GetLastError
HeapFree
CreateFileW
WriteFile
CloseHandle
SetLastError
HeapReAlloc
GetCurrentProcessId
WideCharToMultiByte
Sleep
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentProcess
SetEvent
TlsAlloc
WaitForSingleObject
CreateEventA
CreateThread
GetTickCount64
CreateSemaphoreA
SetFileAttributesW
DeviceIoControl
lstrcmpiW
ResetEvent
TerminateThread
GetFileSizeEx
ReadFile
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
TlsGetValue
TlsSetValue
GetDriveTypeW
GetCommandLineW
ExitProcess
SetErrorMode
EnterCriticalSection
shlwapi
StrCmpNIW
StrStrIW
StrStrIA
SHRegSetUSValueW
StrCmpIW
StrChrW
netapi32
NetGetDCName
NetGetJoinInformation
NetShareEnum
NetApiBufferFree
oleaut32
SysFreeString
SysAllocString
msvcrt
memset
feof
fgetws
_wfopen
_vsnwprintf
fclose
_getch
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.c Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.r Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ