Static task
static1
Behavioral task
behavioral1
Sample
aa76941029f802fec43e0e6ae460a751440109b12f6a3861609866ea21195272.exe
Resource
win7-20220812-en
General
-
Target
aa76941029f802fec43e0e6ae460a751440109b12f6a3861609866ea21195272
-
Size
363KB
-
MD5
6863f1dd31a668e93f6a10fccb7f83d0
-
SHA1
ca56ab55e15d7bfa459573aa958282fdb456e2ee
-
SHA256
aa76941029f802fec43e0e6ae460a751440109b12f6a3861609866ea21195272
-
SHA512
c3dcd8cbdcfae21f992a536cb26c70c1f2f29dae9aac91700baa42a4ffd8b1bdc047eab2b10068ab3caa076c0d4ee06bf7634b8537c72ff75b3d8b96b2af7cc3
-
SSDEEP
6144:vzTpNkyl3cjA7bPypaL4WarCm1FhhekC/fAalXFmgCG5HKYpj/Tj5sPa:5NkuyefL4WwKNt36oFTH
Malware Config
Signatures
Files
-
aa76941029f802fec43e0e6ae460a751440109b12f6a3861609866ea21195272.exe windows x86
5ad0ccf5f94741553d273903bd685a98
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
FileTimeToLocalFileTime
SystemTimeToFileTime
GetFileAttributesA
SetFileAttributesA
FileTimeToSystemTime
MultiByteToWideChar
FormatMessageA
lstrlenA
LocalAlloc
LocalFree
DeviceIoControl
GetPriorityClass
GetCurrentThread
GetThreadPriority
CloseHandle
CreateFileA
LoadLibraryA
GetProcAddress
GetTickCount
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
SetStdHandle
InitializeCriticalSection
VirtualProtect
GetOEMCP
GetACP
GetSystemDirectoryA
CopyFileA
Sleep
GetVersionExA
GetSystemInfo
GetCurrentProcess
GetLastError
FreeLibrary
lstrcpyW
GetCurrentProcessId
ExitProcess
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
RtlUnwind
DeleteFileA
WideCharToMultiByte
GetModuleHandleA
GetCommandLineA
QueryPerformanceCounter
GetCurrentThreadId
GetModuleFileNameA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
LCMapStringA
LCMapStringW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
WriteFile
FlushFileBuffers
GetTimeZoneInformation
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
InterlockedExchange
VirtualQuery
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
GetCPInfo
GetLocaleInfoA
CreateDirectoryA
user32
wsprintfA
advapi32
CloseServiceHandle
RegQueryValueExA
RegOpenKeyExA
DeleteService
ControlService
OpenServiceA
OpenSCManagerA
StartServiceA
CreateServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegCreateKeyExA
RegSetValueExA
SetServiceStatus
RegCloseKey
shell32
SHGetFolderPathA
wsock32
inet_ntoa
recvfrom
inet_addr
closesocket
ioctlsocket
htons
sendto
socket
WSAStartup
bind
setsockopt
ntohs
wintrust
WinVerifyTrust
crypt32
CryptDecodeObject
CertFreeCertificateContext
CryptMsgClose
CertCloseStore
CertVerifyTimeValidity
CertFindCertificateInStore
CryptMsgGetParam
CertGetNameStringA
CryptQueryObject
Sections
.text Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE