Static task
static1
Behavioral task
behavioral1
Sample
117c36db5d0fe53388369bf9a2d81302416d0e3f1b8343b76d30df5b3896b26f.exe
Resource
win7-20220414-en
General
-
Target
117c36db5d0fe53388369bf9a2d81302416d0e3f1b8343b76d30df5b3896b26f
-
Size
182KB
-
MD5
905f31b7ef394d70bd501729cbcec0c2
-
SHA1
f958a8c221d712794836c93528456673faa24150
-
SHA256
117c36db5d0fe53388369bf9a2d81302416d0e3f1b8343b76d30df5b3896b26f
-
SHA512
40827e6ff4fe01184c02e53e94b3df0eb5b471a0bd01c7438213d2d0e02c7157f0fa7156c7ce68df34adaa8e3818262bcb60b5738e03cfd6ace9847076287ff4
-
SSDEEP
3072:zZLmiVXFBqOnYYxoUXo4LUYOBmnDcDu1Cp0pGEjYg2BheA0BqT3uFl/WTn:NmiVXFBqOnYYxoAo4hOBEmu120ohgihH
Malware Config
Signatures
Files
-
117c36db5d0fe53388369bf9a2d81302416d0e3f1b8343b76d30df5b3896b26f.exe windows x86
f2c80626a16bee31a7795bc255def548
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100u
ord1300
msvcr100
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_CRT_RTC_INITW
_except_handler4_common
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
strncat
strncpy_s
strtok_s
atoi
wcsncat
wcsncat_s
_wcsicmp
_wgetcwd
_wchdir
wcsncpy_s
wcsncmp
wcscpy_s
swprintf_s
_time64
_wtoi
_swprintf
wcscat
wcscpy
wcschr
wcsrchr
_snwprintf
free
malloc
realloc
_errno
calloc
strtoul
memcpy
_waccess
_wsopen
_lseek
_close
_read
_filelength
wcslen
memset
_CxxThrowException
wcsncpy
__CxxFrameHandler3
wcsstr
kernel32
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
ReadFile
GetFileSize
RaiseException
GetSystemDirectoryW
LoadLibraryExW
LoadLibraryW
CreateFileW
GetModuleFileNameW
GetVersionExW
GetWindowsDirectoryW
LocalFree
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetPrivateProfileStringW
SetEvent
OutputDebugStringW
CloseHandle
Sleep
CreateThread
CreateEventW
GetLastError
CreateMutexW
GetCurrentProcess
GetProcAddress
GetModuleHandleW
InterlockedDecrement
WaitForMultipleObjects
ResetEvent
OpenEventW
InterlockedIncrement
user32
LoadStringW
advapi32
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegEnumValueW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceStatus
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
RegCloseKey
ole32
CoCreateInstance
StringFromGUID2
CoUninitialize
oleaut32
SysFreeString
SysAllocString
VariantClear
rpcrt4
UuidFromStringW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE