Static task
static1
Behavioral task
behavioral1
Sample
fb5c0286785d3b0717199841963f71e198f0807c72e59c0b029c3159e5c99467.exe
Resource
win7-20220812-en
General
-
Target
fb5c0286785d3b0717199841963f71e198f0807c72e59c0b029c3159e5c99467
-
Size
372KB
-
MD5
71140f7eb932593f506dcf1ccdfde220
-
SHA1
5b8f1cf6dd1f28ff4684cc1622e8543201371c06
-
SHA256
fb5c0286785d3b0717199841963f71e198f0807c72e59c0b029c3159e5c99467
-
SHA512
b6b2b89942b440386e9a0feec0908c1a0c584105a7be29ed54ee74e258e58456c04df8dcdad05a4d6dd07e2f6ef7f7b4392bab132735838309accb8cc0833dda
-
SSDEEP
6144:gN9pXz0JJ6mGa1aQXiWfIyuCmOreSdQA/dQt9FV7tOyrNwVhiB51amM:gN9B03zGKaQXiWgyuCpeS5ettOAqm9tM
Malware Config
Signatures
Files
-
fb5c0286785d3b0717199841963f71e198f0807c72e59c0b029c3159e5c99467.exe windows x86
e55c22acd078f91e6ff50cdae3a52dd3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoW
psapi
GetProcessImageFileNameW
kernel32
FindResourceExW
WideCharToMultiByte
GetModuleFileNameW
OpenEventW
SetEvent
DeleteFileW
MoveFileExW
GetCurrentThreadId
WaitForSingleObject
ConnectNamedPipe
CreateNamedPipeW
WaitNamedPipeW
WriteFile
TerminateThread
ReadFile
CreateFileW
DisconnectNamedPipe
GetLastError
GetLocalTime
LocalFree
CreateThread
lstrlenW
ExpandEnvironmentStringsW
FindResourceW
FindClose
GetPrivateProfileStringA
GetModuleFileNameA
FindNextFileA
SetHandleInformation
CreateProcessA
CreateEventW
CreatePipe
CopyFileW
GetTempPathW
GetFileSize
SetFileAttributesW
CreateDirectoryW
RemoveDirectoryW
GetStringTypeW
LoadLibraryW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
CloseHandle
CreateProcessW
GetPrivateProfileStringW
Sleep
GetModuleHandleW
GetProcAddress
GetTickCount
GetConsoleCP
GetConsoleMode
SetStdHandle
SetEndOfFile
FlushFileBuffers
WriteConsoleW
FindFirstFileA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointer
GetFileType
SetHandleCount
IsProcessorFeaturePresent
RtlUnwind
GetStdHandle
LCMapStringW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
ExitProcess
GetCPInfo
InterlockedIncrement
user32
SetTimer
GetMessageW
TranslateMessage
PostQuitMessage
PostThreadMessageW
FindWindowW
SendMessageTimeoutW
IsWindow
KillTimer
advapi32
RegSetValueExW
RegQueryValueA
RegOpenKeyExA
RegQueryInfoKeyW
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
FreeSid
SetEntriesInAclW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
SHGetFolderPathA
SHGetSpecialFolderPathW
ShellExecuteW
SHGetFolderPathW
ole32
CoUninitialize
CoInitialize
shlwapi
SHGetValueA
wnsprintfW
PathFindFileNameW
PathFileExistsW
wnsprintfA
PathFileExistsA
ws2_32
ntohl
htonl
urlmon
URLDownloadToFileW
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 89KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE