Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
3.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
3.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
4.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
4.exe
Resource
win10v2004-20220414-en
General
-
Target
6475fe94cd3449e37620e0e78fe5d5ccd2855defb71626b1f349b4a96a5c4254
-
Size
350KB
-
MD5
4b0751e0723f814cb13a36ad72e07d6b
-
SHA1
f80a55c0889961f5282788d1f6f5c534b22f9c0f
-
SHA256
6475fe94cd3449e37620e0e78fe5d5ccd2855defb71626b1f349b4a96a5c4254
-
SHA512
056354c98456b3c690047eff45988c61cdbf48e9813c686231bdacec1c0ecf434f4f8b62463da8464078217db743d3e11502043437066b730a0d8b63be7537a1
-
SSDEEP
6144:ZK782T0fwr+ZJ76PK782T0fwr+ZJ77PK782T0fwr+ZJ7F:g7ZQVZF/7ZQVZFe7ZQVZF
Malware Config
Signatures
Files
-
6475fe94cd3449e37620e0e78fe5d5ccd2855defb71626b1f349b4a96a5c4254.iso
-
1.exe.exe windows x86
950b0bca768af462f821fef53421703c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
NdrClientCall2
kernel32
WaitForSingleObject
WaitForMultipleObjects
CloseHandle
lstrcmpiW
CreateMutexW
OpenMutexW
GetModuleFileNameW
ExpandEnvironmentStringsW
GetDriveTypeA
GetSystemDirectoryW
GetVolumeInformationW
VirtualUnlock
GetComputerNameW
MultiByteToWideChar
GetTickCount
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
VirtualLock
GetProcAddress
WriteFile
GetSystemTime
lstrcmpW
GetModuleHandleW
CreateFileW
DeleteCriticalSection
GetNativeSystemInfo
GetDriveTypeW
GetDiskFreeSpaceW
VerSetConditionMask
LocalAlloc
LocalFree
GetCurrentProcess
LoadLibraryA
GetModuleHandleA
InitializeCriticalSection
GlobalAlloc
GlobalFree
MulDiv
GetTempPathW
VirtualQuery
LoadLibraryW
LoadLibraryExW
GetCurrentProcessId
CreateThread
Sleep
ReadFile
ConnectNamedPipe
CreateEventW
CreateNamedPipeW
GetFullPathNameW
GetLastError
ExitThread
TerminateProcess
ExitProcess
OpenProcess
GetShortPathNameW
GetProcessHeap
VirtualFree
VirtualAlloc
lstrlenW
UnlockFile
InterlockedIncrement
WideCharToMultiByte
VerifyVersionInfoW
user32
FillRect
CreateWindowStationW
SetProcessWindowStation
DrawTextA
wsprintfA
SystemParametersInfoW
wsprintfW
ReleaseDC
SetTimer
ShowWindow
CreateWindowExW
RegisterClassW
PostQuitMessage
DefWindowProcW
DispatchMessageW
GetMessageW
GetDC
KillTimer
DrawTextW
gdi32
SetBitmapBits
GetBitmapBits
CreateBitmap
CreateCompatibleDC
CreateFontW
DeleteDC
DeleteObject
GetDeviceCaps
GetDIBits
GetPixel
GetStockObject
SelectObject
SetBkColor
SetPixel
SetTextColor
GetObjectW
CreateCompatibleBitmap
advapi32
GetSidSubAuthorityCount
GetSidSubAuthority
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
3.exe.exe windows x86
950b0bca768af462f821fef53421703c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
NdrClientCall2
kernel32
WaitForSingleObject
WaitForMultipleObjects
CloseHandle
lstrcmpiW
CreateMutexW
OpenMutexW
GetModuleFileNameW
ExpandEnvironmentStringsW
GetDriveTypeA
GetSystemDirectoryW
GetVolumeInformationW
VirtualUnlock
GetComputerNameW
MultiByteToWideChar
GetTickCount
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
VirtualLock
GetProcAddress
WriteFile
GetSystemTime
lstrcmpW
GetModuleHandleW
CreateFileW
DeleteCriticalSection
GetNativeSystemInfo
GetDriveTypeW
GetDiskFreeSpaceW
VerSetConditionMask
LocalAlloc
LocalFree
GetCurrentProcess
LoadLibraryA
GetModuleHandleA
InitializeCriticalSection
GlobalAlloc
GlobalFree
MulDiv
GetTempPathW
VirtualQuery
LoadLibraryW
LoadLibraryExW
GetCurrentProcessId
CreateThread
Sleep
ReadFile
ConnectNamedPipe
CreateEventW
CreateNamedPipeW
GetFullPathNameW
GetLastError
ExitThread
TerminateProcess
ExitProcess
OpenProcess
GetShortPathNameW
GetProcessHeap
VirtualFree
VirtualAlloc
lstrlenW
UnlockFile
InterlockedIncrement
WideCharToMultiByte
VerifyVersionInfoW
user32
FillRect
CreateWindowStationW
SetProcessWindowStation
DrawTextA
wsprintfA
SystemParametersInfoW
wsprintfW
ReleaseDC
SetTimer
ShowWindow
CreateWindowExW
RegisterClassW
PostQuitMessage
DefWindowProcW
DispatchMessageW
GetMessageW
GetDC
KillTimer
DrawTextW
gdi32
SetBitmapBits
GetBitmapBits
CreateBitmap
CreateCompatibleDC
CreateFontW
DeleteDC
DeleteObject
GetDeviceCaps
GetDIBits
GetPixel
GetStockObject
SelectObject
SetBkColor
SetPixel
SetTextColor
GetObjectW
CreateCompatibleBitmap
advapi32
GetSidSubAuthorityCount
GetSidSubAuthority
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
4.exe.exe windows x86
950b0bca768af462f821fef53421703c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
NdrClientCall2
kernel32
WaitForSingleObject
WaitForMultipleObjects
CloseHandle
lstrcmpiW
CreateMutexW
OpenMutexW
GetModuleFileNameW
ExpandEnvironmentStringsW
GetDriveTypeA
GetSystemDirectoryW
GetVolumeInformationW
VirtualUnlock
GetComputerNameW
MultiByteToWideChar
GetTickCount
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
VirtualLock
GetProcAddress
WriteFile
GetSystemTime
lstrcmpW
GetModuleHandleW
CreateFileW
DeleteCriticalSection
GetNativeSystemInfo
GetDriveTypeW
GetDiskFreeSpaceW
VerSetConditionMask
LocalAlloc
LocalFree
GetCurrentProcess
LoadLibraryA
GetModuleHandleA
InitializeCriticalSection
GlobalAlloc
GlobalFree
MulDiv
GetTempPathW
VirtualQuery
LoadLibraryW
LoadLibraryExW
GetCurrentProcessId
CreateThread
Sleep
ReadFile
ConnectNamedPipe
CreateEventW
CreateNamedPipeW
GetFullPathNameW
GetLastError
ExitThread
TerminateProcess
ExitProcess
OpenProcess
GetShortPathNameW
GetProcessHeap
VirtualFree
VirtualAlloc
lstrlenW
UnlockFile
InterlockedIncrement
WideCharToMultiByte
VerifyVersionInfoW
user32
FillRect
CreateWindowStationW
SetProcessWindowStation
DrawTextA
wsprintfA
SystemParametersInfoW
wsprintfW
ReleaseDC
SetTimer
ShowWindow
CreateWindowExW
RegisterClassW
PostQuitMessage
DefWindowProcW
DispatchMessageW
GetMessageW
GetDC
KillTimer
DrawTextW
gdi32
SetBitmapBits
GetBitmapBits
CreateBitmap
CreateCompatibleDC
CreateFontW
DeleteDC
DeleteObject
GetDeviceCaps
GetDIBits
GetPixel
GetStockObject
SelectObject
SetBkColor
SetPixel
SetTextColor
GetObjectW
CreateCompatibleBitmap
advapi32
GetSidSubAuthorityCount
GetSidSubAuthority
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ