Static task
static1
Behavioral task
behavioral1
Sample
9915445297b8d6cc54172258fab23463.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9915445297b8d6cc54172258fab23463.exe
Resource
win10v2004-20230220-en
General
-
Target
9915445297b8d6cc54172258fab23463
-
Size
31KB
-
MD5
9915445297b8d6cc54172258fab23463
-
SHA1
d0d4e1f3764853d9781621dfa85fc1544676810d
-
SHA256
f774090456e47c2c7f8a13dd8e9602d10bf43c7c535c976981d5e8cd6dffdbe4
-
SHA512
0507c28dd5c57117c8c21af99f980e53d0883178d0cf84069a6cb0133ccdcd385db7174b0b906b2d99131144f9b06ae74b90f58c71d4cbce8d9b7604cc2e71f3
-
SSDEEP
768:cSCoDoxobHzYLj0/ebq2/ic0FvBacYJrp:cZocxobHij0/Cq26VvBip
Malware Config
Signatures
Files
-
9915445297b8d6cc54172258fab23463.exe windows x64
58ab3ebdd7fe2c3d8739bcea233c6e68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
OpenProcess
CreateToolhelp32Snapshot
GetLastError
Process32NextW
HeapAlloc
GetProcessHeap
DuplicateHandle
WriteProcessMemory
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
VirtualAllocEx
CreateProcessW
CreateRemoteThread
RtlLookupFunctionEntry
LocalAlloc
K32GetModuleFileNameExW
GetCurrentProcess
GetCurrentProcessId
CloseHandle
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlCaptureContext
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
GetSystemTimeAsFileTime
advapi32
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
GetSidSubAuthorityCount
msvcp140
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?_Xlength_error@std@@YAXPEBD@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z
ntdll
NtQueryObject
NtQueryInformationProcess
NtQuerySystemInformation
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_copy
__current_exception
memcpy
memset
__current_exception_context
_CxxThrowException
memmove
__C_specific_handler
wcsrchr
__std_exception_destroy
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vfwprintf
__acrt_iob_func
__p__commode
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_cexit
exit
_initterm_e
_initterm
__p___wargv
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_get_initial_wide_environment
_invalid_parameter_noinfo_noreturn
_initialize_wide_environment
__p___argc
_c_exit
_exit
_set_app_type
_seh_filter_exe
_configure_wide_argv
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
malloc
_callnewh
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ