Static task
static1
Behavioral task
behavioral1
Sample
0fcc3c7bfb60ad06127d3a20b9d055a2f3b350c5e4159edbc8f915e9c17e45e4.exe
Resource
win7-20220901-en
General
-
Target
0fcc3c7bfb60ad06127d3a20b9d055a2f3b350c5e4159edbc8f915e9c17e45e4
-
Size
1.3MB
-
MD5
006f2df6e05107b62e38664576d76d30
-
SHA1
fe1bc78afdffe15eec242c94d62956ad5c0a2938
-
SHA256
0fcc3c7bfb60ad06127d3a20b9d055a2f3b350c5e4159edbc8f915e9c17e45e4
-
SHA512
865ca7e34820d89114588ff5a4f96cd6dd9a1fbf2deb7171b6b5a60cd1f104d95e6bc2680b3aa8bbdd07c95fcef38aafc6afdd04302a1f27ecd5957bf3d6749e
-
SSDEEP
24576:/jgxagu9O4HdDCS0imG5+AeeUrFEIyCazZhDGuDwFiDCYZaT9+kpjeYe3e38otVI:4aguhuUMJeU5EIy/thDGuciDCY8T9+Ei
Malware Config
Signatures
Files
-
0fcc3c7bfb60ad06127d3a20b9d055a2f3b350c5e4159edbc8f915e9c17e45e4.exe windows x86
19a35c894dc48e0b74520ef0cb61ff1b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htons
kernel32
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GetFileAttributesW
GetTempPathW
GetCurrentDirectoryW
InterlockedCompareExchange
CreateMutexW
SetFilePointer
CreateProcessW
WaitForSingleObject
FormatMessageA
ReleaseMutex
InterlockedExchangeAdd
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
Sleep
GetProcAddress
GetCurrentThreadId
GetNativeSystemInfo
GetFileInformationByHandle
GetModuleHandleW
GetVersionExW
GetComputerNameW
LocalFree
GetVolumeInformationW
GetFullPathNameA
CreateFileA
GetFileSize
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSection
LoadLibraryW
FormatMessageW
GetFileAttributesA
LockFileEx
GetDiskFreeSpaceW
LoadLibraryA
GetDiskFreeSpaceA
DeleteFileW
GetCurrentProcessId
GetTempPathA
GetSystemTime
AreFileApisANSI
DeleteFileA
SetEnvironmentVariableA
SetEnvironmentVariableW
WriteConsoleW
GetLastError
GetFileSizeEx
FlushFileBuffers
CreateFileW
ReadFile
WriteFile
CreateDirectoryA
LockFile
UnlockFile
SetEndOfFile
FindFirstFileExW
CloseHandle
GetWindowsDirectoryW
GetModuleFileNameW
GetSystemDirectoryW
FindNextFileW
FindClose
FindFirstFileW
GetFullPathNameW
RemoveDirectoryA
GetCurrentProcess
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
GetLocaleInfoW
HeapFree
HeapAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
GetCPInfo
ExitProcess
HeapReAlloc
GetFileType
SetFileAttributesW
CreateDirectoryW
GetDriveTypeA
FindFirstFileExA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
GetStdHandle
GetConsoleCP
GetConsoleMode
HeapCreate
PeekNamedPipe
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
GetTimeZoneInformation
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
user32
MessageBoxW
advapi32
ConvertSidToStringSidW
LookupAccountNameW
CryptDestroyKey
CryptImportKey
CryptSetHashParam
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
CryptAcquireContextW
CryptGetHashParam
shell32
SHGetFolderPathW
ole32
CoTaskMemFree
Sections
.text Size: 899KB - Virtual size: 898KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 341KB - Virtual size: 341KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ