Static task
static1
Behavioral task
behavioral1
Sample
04b671cf2f269a12b996633e83b397f2924ebbac425919d74e2bbc3013a238b5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
04b671cf2f269a12b996633e83b397f2924ebbac425919d74e2bbc3013a238b5.exe
Resource
win10v2004-20230221-en
General
-
Target
04b671cf2f269a12b996633e83b397f2924ebbac425919d74e2bbc3013a238b5
-
Size
129KB
-
MD5
08f850febdbde7c89017b6b0ca0d1cd2
-
SHA1
9663d55c451482410e901cef6b2a07f5dc721d16
-
SHA256
04b671cf2f269a12b996633e83b397f2924ebbac425919d74e2bbc3013a238b5
-
SHA512
6dde21b2f8da1c9a603bcdb3ed035cbb4b701ada9b81915b82c639a44a66c17ed41303d2afbf03f8f310c3e0902186cadec1bb26043ba78d3bcb2f5201a409d5
-
SSDEEP
3072:SdS+VcgZcS26pK3Lf+OlU01J8tkhO3P9R:aVcyO+m3ikk
Malware Config
Signatures
Files
-
04b671cf2f269a12b996633e83b397f2924ebbac425919d74e2bbc3013a238b5.exe windows x64
92c94e76ab4f116f55d5de77a8857ba2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
RtlUpcaseUnicodeChar
NtOpenKey
NtClose
TpAllocTimer
TpSetTimer
NtQuerySystemInformation
RtlAllocateHeap
RtlFreeHeap
NtSetValueKey
RtlUnicodeStringToInteger
RtlFreeUnicodeString
RtlInitUnicodeStringEx
NtOpenFile
NtDeviceIoControlFile
NtQueryValueKey
RtlInitUnicodeString
RtlPrefixUnicodeString
NtQueryInformationProcess
NtQueryVolumeInformationFile
RtlGetVersion
_vsnwprintf_s
NtCreatePagingFile
NtSetSystemInformation
RtlAppendUnicodeToString
NtPowerInformation
NtCreateFile
RtlSecondsSince1970ToTime
qsort
NtSetInformationFile
NtQueryInformationFile
NtFsControlFile
RtlCompareUnicodeString
RtlAppendUnicodeStringToString
RtlCompareMemory
NtDeleteValueKey
NtFlushKey
NtUpdateWnfStateData
NtSerializeBoot
RtlAllocateAndInitializeSid
RtlCreateSecurityDescriptor
RtlCreateAcl
RtlAddAccessAllowedAce
RtlSetDaclSecurityDescriptor
RtlSetOwnerSecurityDescriptor
NtSetSecurityObject
RtlExpandEnvironmentStrings_U
RtlDosPathNameToNtPathName_U
NtReadFile
NtCreateKey
RtlCreateUnicodeString
EtwEventWrite
EtwEventEnabled
RtlAddMandatoryAce
RtlSetSaclSecurityDescriptor
RtlAdjustPrivilege
RtlFreeSid
RtlLengthSid
NtCreateMutant
RtlCreateTagHeap
NtSetInformationProcess
NtAlpcCreatePort
RtlInitializeBitMap
RtlClearAllBits
RtlSetBits
NtOpenEvent
RtlCreateEnvironment
RtlSetCurrentEnvironment
RtlQueryRegistryValuesEx
NtCreateDirectoryObject
RtlEqualUnicodeString
NtResumeThread
NtWaitForSingleObject
NtTerminateProcess
NtSetEvent
NtInitializeRegistry
TpAllocWork
TpPostWork
TpReleaseWork
_wcsupr_s
NtOpenDirectoryObject
NtCreateSymbolicLinkObject
NtMakeTemporaryObject
_stricmp
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlRandomEx
qsort_s
LdrVerifyImageMatchesChecksumEx
RtlAppxIsFileOwnedByTrustedInstaller
_wcsicmp
RtlSetEnvironmentVariable
NtCreateSection
NtMapViewOfSection
iswctype
RtlQueryEnvironmentVariable_U
RtlDosSearchPath_U
RtlTestBit
RtlInterlockedSetBitRun
RtlFindSetBits
RtlCreateProcessParametersEx
RtlCreateUserProcess
RtlDestroyProcessParameters
NtDisplayString
RtlGetAce
NtQueryDirectoryObject
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
RtlTimeToTimeFields
NtWriteFile
RtlAcquireSRWLockExclusive
RtlGetNtProductType
RtlReleaseSRWLockExclusive
NtOpenSection
NtQuerySection
NtMakePermanentObject
NtDeleteKey
NtDeleteFile
NtAlpcDisconnectPort
RtlAcquireSRWLockShared
RtlReleaseSRWLockShared
NtAlpcImpersonateClientOfPort
NtOpenThreadToken
NtQueryInformationToken
NtSetInformationThread
TpSetPoolMinThreads
RtlSetThreadIsCritical
AlpcInitializeMessageAttribute
NtAlpcSendWaitReceivePort
AlpcGetMessageAttribute
NtAlpcCancelMessage
NtAlpcOpenSenderProcess
RtlInitializeSRWLock
NtAlpcAcceptConnectPort
NtConnectPort
NtRequestWaitReplyPort
NtDuplicateObject
NtCreateEvent
RtlFindClearBits
RtlSleepConditionVariableSRW
NtClearEvent
RtlDeleteNoSplay
RtlClearBits
RtlWakeConditionVariable
RtlWakeAllConditionVariable
EtwGetTraceLoggerHandle
EtwGetTraceEnableLevel
EtwGetTraceEnableFlags
EtwRegisterTraceGuidsW
RtlSetHeapInformation
EtwEventRegister
RtlSetProcessIsCritical
TpAllocPool
TpAllocAlpcCompletion
NtWaitForMultipleObjects
NtRaiseHardError
RtlInitializeConditionVariable
NtDelayExecution
RtlUnicodeStringToAnsiString
NtQueryEvent
wcstoul
LdrQueryImageFileExecutionOptions
RtlAcquirePrivilege
RtlReleasePrivilege
EtwTraceMessage
TpAllocWait
TpSetWait
TpReleaseWait
DbgPrintEx
RtlNtStatusToDosError
_ltow_s
RtlCheckTokenMembership
_wcsnicmp
RtlCompareUnicodeStrings
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlUnhandledExceptionFilter
iswspace
RtlNormalizeProcessParams
RtlConnectToSm
RtlSendMsgToSm
NtQueryKey
__chkstk
memcpy
memset
__C_specific_handler
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ