Static task
static1
Behavioral task
behavioral1
Sample
7df182e85d415b68e41d531a3e3df91c18523a8ea368acf40b829a828fc1cde3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7df182e85d415b68e41d531a3e3df91c18523a8ea368acf40b829a828fc1cde3.exe
Resource
win10v2004-20220812-en
General
-
Target
7df182e85d415b68e41d531a3e3df91c18523a8ea368acf40b829a828fc1cde3
-
Size
128KB
-
MD5
6fee5e5425781722e4667edc09338080
-
SHA1
2a006e6450ba4de475866cac38aa32cb167ded72
-
SHA256
7df182e85d415b68e41d531a3e3df91c18523a8ea368acf40b829a828fc1cde3
-
SHA512
e1d01bcf20851ead67ab270c444f6137d7ddc3532440bfcbe0e1e4ee452f537181272cc16ef85e1d9a64b900343103cab078c0b403c40543c2aa4e25e48b709d
-
SSDEEP
3072:u1stlkS7JANZJlKtBiaj1c1Yxt2oRipvzxVNSfzr1+K12Hw:A0qNr+ROQbrMKl
Malware Config
Signatures
Files
-
7df182e85d415b68e41d531a3e3df91c18523a8ea368acf40b829a828fc1cde3.exe windows x86
46c88ff5286cefa5f7eee35d88b76497
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
SymUnDName
SymGetSymFromAddr
SymSetOptions
SymInitialize
SymGetModuleBase
SymFunctionTableAccess
SymGetModuleInfo
SymCleanup
StackWalk
atl71
ord17
ord20
ord49
ord32
ord23
ord61
ord58
ord31
ord30
ord18
ord64
ord22
sqlunirl
_FormatMessage@28
_GetProcAddress_@8
_GetVersionEx@4
_GetUnicodeRedirectionLayer@0
_LoadString@16
kernel32
lstrcpyA
ExpandEnvironmentStringsA
LoadLibraryA
GetModuleFileNameA
FormatMessageA
GetLastError
GetSystemDefaultLangID
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
LeaveCriticalSection
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
ResetEvent
SetEvent
GetModuleHandleA
GetSystemInfo
SetFilePointer
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
SetErrorMode
QueryPerformanceFrequency
GlobalMemoryStatus
WriteFile
lstrlenA
HeapFree
FlushFileBuffers
ReadProcessMemory
HeapAlloc
GetProcessHeap
GetCurrentProcess
GetEnvironmentVariableA
CreateFileA
InterlockedIncrement
InterlockedDecrement
WaitForMultipleObjects
WaitForSingleObject
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
AllocConsole
GetStdHandle
GetCurrentThreadId
CreateEventA
GetCommandLineA
RaiseException
GetSystemDefaultLCID
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
EnterCriticalSection
user32
wsprintfA
MessageBoxA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CopySid
RegSetValueExA
GetLengthSid
IsValidSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
OpenProcessToken
MakeSelfRelativeSD
GetSecurityDescriptorLength
ole32
CoRevokeClassObject
CoCreateInstance
CoRegisterClassObject
CoUninitialize
CoInitializeSecurity
CoInitializeEx
oleaut32
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
msvcp71
?_Nomemory@std@@YAXXZ
msvcr71
_controlfp
_onexit
__dllonexit
??1type_info@@UAE@XZ
__security_error_handler
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_callnewh
memset
_resetstkoflw
_iob
freopen
printf
?terminate@@YAXXZ
_amsg_exit
_stricmp
wcsncat
wcslen
wcscpy
wcsncpy
wcschr
sprintf
??3@YAXPAX@Z
_CxxThrowException
_vsnwprintf
free
malloc
wprintf
_except_handler3
??_V@YAXPAX@Z
strchr
asctime
localtime
time
_strnicmp
_purecall
fclose
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE