Static task
static1
Behavioral task
behavioral1
Sample
dc7b3143f7642eeabc9fe7e976281acb58cb4ec81ce90e4b282b4e258ee60422.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc7b3143f7642eeabc9fe7e976281acb58cb4ec81ce90e4b282b4e258ee60422.exe
Resource
win10v2004-20220901-en
General
-
Target
dc7b3143f7642eeabc9fe7e976281acb58cb4ec81ce90e4b282b4e258ee60422
-
Size
263KB
-
MD5
61c16d60997563330c1f1abb1fdc39f0
-
SHA1
7e183314fef1094e1ae0ad495bbac4a514e42144
-
SHA256
dc7b3143f7642eeabc9fe7e976281acb58cb4ec81ce90e4b282b4e258ee60422
-
SHA512
4c542a3a7c700a699407474d74c1aed811308262d6e1d69e76172b4c740b196d3a6df8f918adea5b966e92982280f7bbfd9a44f38e5f317999f5a7907fe6072d
-
SSDEEP
6144:/oSCCdLVDNUw4kkhulPzW1/zhYKq4lpZKeLCr/MwZVcfw+U3yrn:XPtZsvh6P4zmKblpcmCQwgfwOb
Malware Config
Signatures
Files
-
dc7b3143f7642eeabc9fe7e976281acb58cb4ec81ce90e4b282b4e258ee60422.exe windows x86
06afd7c0180731f6e043437ac6e6dfc5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
SetFilePointer
WaitForSingleObjectEx
LoadLibraryW
WriteFile
GetUserDefaultLCID
lstrcpyA
VirtualFree
OutputDebugStringA
ReleaseSemaphore
WaitForMultipleObjects
ResetEvent
GetModuleFileNameA
ReadFile
CreateEventA
CreateThread
InterlockedDecrement
GetOEMCP
QueryPerformanceCounter
InterlockedIncrement
GlobalFindAtomW
GlobalAlloc
HeapCreate
GetEnvironmentStringsA
FindNextFileA
OpenFileMappingA
FindClose
OpenSemaphoreA
GetSystemDefaultLangID
ReleaseMutex
WriteFileEx
GetEnvironmentStringsW
GetCurrentProcessId
CreateSemaphoreA
ExpandEnvironmentStringsA
SetEndOfFile
GetLastError
GetCPInfo
lstrcmpA
GlobalFree
DeleteCriticalSection
SetLastError
EnterCriticalSection
GetFileAttributesA
ReadFileEx
CreateDirectoryA
GetFileSize
LCMapStringW
MapViewOfFile
CreateMutexA
CompareStringW
FreeLibrary
UnmapViewOfFile
OpenEventA
GetExitCodeThread
GetSystemInfo
RemoveDirectoryA
GetModuleHandleW
OpenMutexA
FindFirstFileA
lstrlenA
CreateFileA
GetTickCount
GetUserDefaultLangID
GetProcAddress
SetThreadPriority
WaitForSingleObject
GetDiskFreeSpaceA
CloseHandle
SetEvent
msvcrt
vprintf
printf
fclose
fopen
_fullpath
strncpy
_strnicmp
_iob
_itoa
wcslen
_stricmp
fflush
sprintf
toupper
strncmp
_makepath
_splitpath
fprintf
_strupr
isprint
rand
memmove
advapi32
RegDeleteValueA
RegDeleteKeyA
AllocateAndInitializeSid
RegQueryValueExA
FreeSid
RegCloseKey
DeregisterEventSource
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegisterEventSourceA
InitializeAcl
ReportEventA
SetSecurityDescriptorDacl
GetLengthSid
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ