Static task
static1
Behavioral task
behavioral1
Sample
dc093b52f190e0d5b5ae49b2da8fcec8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
dc093b52f190e0d5b5ae49b2da8fcec8.exe
Resource
win10v2004-20231215-en
General
-
Target
dc093b52f190e0d5b5ae49b2da8fcec8
-
Size
82KB
-
MD5
dc093b52f190e0d5b5ae49b2da8fcec8
-
SHA1
7945ff18a0fdbabd7ff9fd59be873febed8944ae
-
SHA256
1359dd675b318675146c60470a697ef082ce71809e7defdc0b0645605a15b10d
-
SHA512
c45177b106a79bdcc1fa592935c90c33a33f3d777c18132a08127a4deaba50ce05b0c88bc03d6d7dd12ceec9b192606e732e2fd7abb51fd7c274faa58aaa81e9
-
SSDEEP
1536:RVvjoKPZlvWsYk/gK8M3GizFkSqfJA+Kbok+yZSZ4DnPDMQ:3DrOsF/zd3GizHqRagyZSZ4DnPD
Malware Config
Signatures
Files
-
dc093b52f190e0d5b5ae49b2da8fcec8.exe windows:5 windows x86 arch:x86
797eef0b19f46c5b9ab86fc74388104c
Code Sign
e6:29:e9:13:9e:fc:66:71:7a:cb:2b:d8:16:ef:94:1a:e6:78:21:01Signer
Actual PE Digeste6:29:e9:13:9e:fc:66:71:7a:cb:2b:d8:16:ef:94:1a:e6:78:21:01Digest Algorithmsha1PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
PathGetArgsW
kernel32
CreateProcessW
GetModuleFileNameW
lstrlenW
lstrlenA
WaitForSingleObject
GetExitCodeProcess
GetCurrentProcessId
LocalFree
GetCommandLineW
SetStdHandle
WriteConsoleW
CloseHandle
FlushFileBuffers
HeapReAlloc
GetConsoleMode
GetConsoleCP
LocalAlloc
GetProcAddress
FreeLibrary
InterlockedExchange
GetLastError
LoadLibraryA
RaiseException
ReleaseSemaphore
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
VirtualQuery
CreateFileW
SetUnhandledExceptionFilter
RtlCaptureContext
InterlockedDecrement
DeleteCriticalSection
LoadLibraryW
CreateThread
CreateSemaphoreW
InitializeCriticalSection
InterlockedIncrement
WaitNamedPipeW
WaitForMultipleObjects
SetEvent
ResetEvent
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
GetTempPathW
UnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
HeapFree
IsProcessorFeaturePresent
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
HeapSize
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RtlUnwind
SetFilePointer
advapi32
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ