Static task
static1
Behavioral task
behavioral1
Sample
474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219.exe
Resource
win7-20220812-en
General
-
Target
474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219
-
Size
449KB
-
MD5
079d733f2cfde87a696f05f746f16200
-
SHA1
c5f5726cfcd96347c01b163c1e6f84eeb0eea841
-
SHA256
474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219
-
SHA512
6edba0c78c6bb349209b2ddb2b604cff26ffd267bfdc987f3ff6de86c8e0c606f633dcc3c7ecd7dc8ced2af374c5f6ec9aa5bb8d702bece0f3f459c2775c263d
-
SSDEEP
12288:btcZiSnQDRwnzDhJmFur16KKMN+uCrTevQ:bUnUo+up6KKMsuCr
Malware Config
Signatures
Files
-
474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219.exe windows x86
de46e8d8c4926607d71622fc718f06af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleCtrlHandler
LocalFree
FormatMessageW
CloseHandle
GetCurrentProcess
CreateFileW
BackupRead
BackupSeek
SetFileTime
MoveFileW
FlushFileBuffers
SetFilePointer
SetEndOfFile
GetFileTime
GetFileType
CreateFileA
ReadFile
WriteFile
GetDriveTypeA
GetDiskFreeSpaceA
GetVolumeInformationA
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
MoveFileA
DeleteFileA
DeleteFileW
RemoveDirectoryA
RemoveDirectoryW
DeviceIoControl
CreateDirectoryA
CreateDirectoryW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
FindClose
FindNextFileA
FindFirstFileA
FindNextFileW
FindFirstFileW
GetVersionExW
CreateThread
Sleep
GetProcessAffinityMask
WaitForSingleObject
SetEvent
ResetEvent
SetThreadPriority
GetCurrentThread
WaitForMultipleObjects
CreateEventW
GetFullPathNameA
GetFullPathNameW
GetModuleFileNameA
GetModuleFileNameW
MultiByteToWideChar
SetErrorMode
FreeLibrary
LoadLibraryW
LoadLibraryExW
GetCurrentProcessId
CompareStringA
SetPriorityClass
SetCurrentDirectoryA
GetCurrentDirectoryA
LocalFileTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
WideCharToMultiByte
CompareStringW
IsDBCSLeadByte
GetCPInfo
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetEnvironmentVariableA
GetLocaleInfoA
GetLastError
GetCurrentDirectoryW
GetTickCount
GetSystemTime
SystemTimeToFileTime
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleW
GetCommandLineW
GetModuleHandleW
GetProcAddress
ExitThread
SetLastError
GetStringTypeW
GetStringTypeA
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwind
ExitProcess
RaiseException
GetCommandLineA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
user32
CharLowerW
ExitWindowsEx
CharUpperA
CharLowerA
LoadStringW
CharUpperW
CharToOemBuffW
CharToOemA
OemToCharA
OemToCharBuffA
CharToOemBuffA
advapi32
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetFileSecurityW
GetFileSecurityA
GetSecurityDescriptorLength
SetFileSecurityW
SetFileSecurityA
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationW
Sections
.text Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 54KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE