Static task
static1
Behavioral task
behavioral1
Sample
76b343bce2ed50f9d21799a933d02b688e200178c08d63287a249f8a41bedc3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
76b343bce2ed50f9d21799a933d02b688e200178c08d63287a249f8a41bedc3d.exe
Resource
win10v2004-20220901-en
General
-
Target
76b343bce2ed50f9d21799a933d02b688e200178c08d63287a249f8a41bedc3d
-
Size
116KB
-
MD5
06c30f8ab7f8b3e71b3f59bfab12bb61
-
SHA1
7e7ca1d2a6e3f86115d6d591c9023d818d56fc45
-
SHA256
76b343bce2ed50f9d21799a933d02b688e200178c08d63287a249f8a41bedc3d
-
SHA512
b4dfe9d8b555412e65e6088ebba7c756db074a689b42edf305a3ddfa9f80ae7a064ab864372ed94339a0e86600190c7a6ddca1436b98f0567e4fe1f11b2a9f82
-
SSDEEP
3072:rOK+/qHBPRudvpm7zVOyr9sB7gjNUGOWyS7t:SK+/uB5uyOyR+7gtOWyS7
Malware Config
Signatures
Files
-
76b343bce2ed50f9d21799a933d02b688e200178c08d63287a249f8a41bedc3d.exe windows x86
a03c30bc27e48e82b93bc8315dc15968
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord3738
ord561
ord815
ord2514
ord2621
ord1134
ord641
ord5265
ord4376
ord4853
ord4998
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord4424
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord1168
ord2370
ord4234
ord1979
ord5442
ord3318
ord665
ord5186
ord354
ord5710
ord4710
ord755
ord470
ord4224
ord2379
ord1146
ord4058
ord536
ord926
ord922
ord4622
ord4080
ord3079
ord3825
ord3831
ord1576
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord4204
ord6662
ord4278
ord6283
ord6282
ord6569
ord6648
ord5683
ord924
ord2781
ord3178
ord3181
ord6877
ord1980
ord825
ord940
ord823
ord859
ord4202
ord2818
ord2764
ord939
ord4129
ord2777
ord2915
ord356
ord540
ord858
ord941
ord2770
ord668
ord535
ord860
ord802
ord542
ord800
ord1727
ord537
msvcrt
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_adjust_fdiv
_except_handler3
_onexit
__dllonexit
strrchr
memcpy
strtok
atof
_setmbcp
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
memset
__CxxFrameHandler
_mbscmp
_ftol
atoi
_iob
fflush
_mbsrchr
time
srand
rand
toupper
_mbsicmp
strcpy
strcat
malloc
sprintf
strlen
printf
free
kernel32
OpenProcess
TerminateProcess
Process32Next
GetLogicalDriveStringsA
GetDriveTypeA
SetVolumeMountPointA
CloseHandle
SetPriorityClass
GetLastError
GetFileAttributesA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
DeleteFileA
GetDiskFreeSpaceA
SetFileAttributesA
Process32First
FindClose
FindNextFileA
FindFirstFileA
FreeLibrary
LoadLibraryA
GetVersion
GetCommandLineA
lstrcpyA
lstrlenA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
CreateProcessA
GetTickCount
GetStartupInfoA
CreateToolhelp32Snapshot
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
AreFileApisANSI
CreateFileA
CopyFileA
CreateDirectoryA
OutputDebugStringA
GetModuleFileNameA
GetSystemDirectoryA
lstrcmpiA
LocalFree
FormatMessageA
FlushFileBuffers
WriteFile
SetFilePointer
RemoveDirectoryA
MoveFileA
WaitForSingleObject
user32
GetWindowThreadProcessId
LoadIconA
EnableWindow
GetClientRect
IsIconic
DrawIcon
GetSystemMetrics
SendMessageA
FindWindowA
advapi32
RegDeleteValueA
RegDeleteKeyA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegUnLoadKeyA
RegLoadKeyA
RegEnumValueA
RegEnumKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
shell32
SHChangeNotify
ShellExecuteA
ole32
CoCreateGuid
CoUninitialize
CoInitialize
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
shlwapi
SHDeleteKeyA
PathFileExistsA
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 936KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ