Static task
static1
Behavioral task
behavioral1
Sample
829848b8ba59be0ab5efa1af9b762859db3efe03a9269fa3598b9e8a5bae566c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
829848b8ba59be0ab5efa1af9b762859db3efe03a9269fa3598b9e8a5bae566c.exe
Resource
win10v2004-20230220-en
General
-
Target
829848b8ba59be0ab5efa1af9b762859db3efe03a9269fa3598b9e8a5bae566c
-
Size
216KB
-
MD5
1ecdd3a1f7fb243a737339f515ce11e9
-
SHA1
cfc7326827cca24f04fec54e19c3fc9bbefbc4ef
-
SHA256
829848b8ba59be0ab5efa1af9b762859db3efe03a9269fa3598b9e8a5bae566c
-
SHA512
78b466a808e69345bfcf48152e0a393d31def9c342cd415da1480423d1bf3f0f00227948c522b6e562699da9d72a653dd97162762135aa2685bddaa8addbcc00
-
SSDEEP
6144:J8d2bGU6JQAmpty5xNs0gu3E+p3KSDtdrkouUPn:0mpo5l/3EG6m/
Malware Config
Signatures
Files
-
829848b8ba59be0ab5efa1af9b762859db3efe03a9269fa3598b9e8a5bae566c.exe windows x86
09ba302972d6cfa511f9d0e4461da2df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
lstrcatA
lstrcatW
lstrlenW
GetModuleHandleA
CreateFileW
DeleteFileW
SetFilePointer
SetConsoleTextAttribute
WriteConsoleA
lstrcpyW
GetSystemDirectoryW
GetTempPathW
Wow64EnableWow64FsRedirection
LocalFree
VirtualAlloc
VirtualFree
ExitProcess
CreateThread
OpenThread
GetOverlappedResult
SetErrorMode
ResumeThread
CheckRemoteDebuggerPresent
DeleteCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
DeviceIoControl
DuplicateHandle
lstrcpynW
CreateMutexW
CreateEventW
OpenEventW
GetModuleFileNameW
GetCommandLineW
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
QueryDosDeviceW
CreateNamedPipeW
IsWow64Process
GetFinalPathNameByHandleW
SetConsoleCtrlHandler
CloseHandle
ReadFile
WriteFile
GetStdHandle
GetFileSize
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetLastError
GetCurrentThreadId
GetCurrentProcess
OpenProcess
GetProcessHeap
HeapFree
HeapReAlloc
HeapAlloc
GetProcAddress
user32
wsprintfA
wvsprintfA
wsprintfW
advapi32
OpenServiceW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
ChangeServiceConfigW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
QueryServiceObjectSecurity
RegisterServiceCtrlHandlerA
SetServiceObjectSecurity
SetServiceStatus
StartServiceCtrlDispatcherA
StartServiceW
SetEntriesInAclA
OpenSCManagerW
ntdll
RtlGetVersion
isalpha
isspace
ispunct
NtQuerySystemInformation
NtUnmapViewOfSection
NtSuspendThread
NtSuspendProcess
NtResumeProcess
NtProtectVirtualMemory
NtWriteVirtualMemory
NtCreateSection
NtMapViewOfSection
NtOpenFile
NtQueryDirectoryFile
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ