Static task
static1
Behavioral task
behavioral1
Sample
de5d1fca7fc1c676f1281c9b73193953c1b80cc708049a2c5034f01301a40f02.exe
Resource
win7-20220901-en
General
-
Target
de5d1fca7fc1c676f1281c9b73193953c1b80cc708049a2c5034f01301a40f02
-
Size
1.5MB
-
MD5
7837903da0eae1d1e7c4fe57ae844769
-
SHA1
706da4f1e38ba35918c74f8f5f93b9859984900d
-
SHA256
de5d1fca7fc1c676f1281c9b73193953c1b80cc708049a2c5034f01301a40f02
-
SHA512
fbd4542df54e63ae5ee5e0e725f8a4b21ae9772794a122da90d7815a660056985268738a239ab0e9e59e29d07b4256da814b82d482a942fd3faed14e8db0e4f6
-
SSDEEP
24576:5FzWH4CTG68n7er6q2ThmGgKRZ8YiVvrj+y02Zm8Fi4T17xExE/t2rVdF7ftaZEj:7Aqw6PFvgKRZ8YiVvrj+yNZmt2/SaZG
Malware Config
Signatures
Files
-
de5d1fca7fc1c676f1281c9b73193953c1b80cc708049a2c5034f01301a40f02.exe windows x86
5c29c79cdafc753c7386f876d3ba350c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileW
FindNextFileA
FindClose
GetProcessTimes
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateFileA
ReadFile
WriteFile
DeviceIoControl
SetLastError
GetCurrentProcessId
GetModuleFileNameA
GetSystemTime
SystemTimeToFileTime
GetLocalTime
LocalAlloc
GetFileSize
SearchPathA
CreateSemaphoreA
OpenSemaphoreA
ReleaseSemaphore
GetCurrentDirectoryW
CompareStringW
CompareStringA
IsBadCodePtr
IsBadReadPtr
GetExitCodeProcess
CreatePipe
SetEnvironmentVariableA
SetEnvironmentVariableW
GetFullPathNameW
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
CreateEventA
FlushFileBuffers
LCMapStringW
LCMapStringA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FindFirstFileW
SetUnhandledExceptionFilter
SetEndOfFile
GetStdHandle
SetHandleCount
SetStdHandle
HeapSize
IsBadWritePtr
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
HeapDestroy
TlsGetValue
TlsAlloc
GetCurrentThreadId
GetFullPathNameA
GetCurrentDirectoryA
PeekNamedPipe
GetFileInformationByHandle
DuplicateHandle
ExitThread
TlsSetValue
CreateThread
ResumeThread
DeleteFileW
DeleteFileA
GetFileAttributesW
MoveFileW
MoveFileA
ResetEvent
GetTickCount
CreateMutexA
WaitForSingleObject
ReleaseMutex
CloseHandle
SetHandleInformation
SetErrorMode
GetEnvironmentVariableW
GetCommandLineW
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetModuleHandleA
LoadLibraryA
FreeLibrary
GetProcAddress
ExitProcess
GetEnvironmentVariableA
GetShortPathNameA
FormatMessageA
LocalFree
Sleep
VirtualFree
VirtualAlloc
GetCurrentProcess
GetDriveTypeA
GetVolumeInformationA
UnhandledExceptionFilter
SetEvent
GetDriveTypeW
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileW
HeapReAlloc
GetLastError
CreateProcessA
GetVersion
GetWindowsDirectoryA
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
InterlockedIncrement
InterlockedDecrement
GetCommandLineA
GetStartupInfoA
RaiseException
GetFileType
SetFilePointer
GetFileAttributesA
GetSystemTimeAsFileTime
GetTimeZoneInformation
HeapFree
HeapAlloc
RtlUnwind
user32
SetMenuItemInfoA
MessageBoxA
SendDlgItemMessageA
ShowCursor
SetCursor
LoadCursorA
GetCursor
GetWindowTextLengthA
SendMessageA
GetDlgItem
CheckRadioButton
GetWindowTextA
MessageBeep
EnableWindow
CreateDialogParamA
EndDialog
GetWindowLongA
RedrawWindow
PostMessageA
SetFocus
ShowWindow
DestroyWindow
InvalidateRect
SetForegroundWindow
wsprintfA
SetWindowTextA
DialogBoxIndirectParamA
CreateDialogIndirectParamA
GetClientRect
GetFocus
GetParent
GetDlgItemTextA
GetDlgItemTextW
SetDlgItemTextA
GetSystemMetrics
GetActiveWindow
LoadBitmapA
SetWindowLongA
CallWindowProcA
GetWindowRect
ScreenToClient
MoveWindow
GetDC
ReleaseDC
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
IsDialogMessageA
IsWindowEnabled
netapi32
Netbios
advapi32
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
GetUserNameW
GetUserNameA
RegSetValueExW
RegQueryValueExW
RegEnumValueA
ControlService
StartServiceA
RegDeleteKeyA
DeleteService
QueryServiceConfigA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
OpenServiceA
ChangeServiceConfigA
RegEnumKeyExA
RegSetValueExA
gdi32
DeleteObject
SelectObject
GetTextMetricsA
GetStockObject
CreateFontIndirectA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
shell32
ShellExecuteA
comctl32
ImageList_Add
ImageList_Create
ImageList_GetImageCount
ord17
wsock32
WSACleanup
getprotobyname
recv
htons
closesocket
send
gethostname
ntohl
htonl
gethostbyname
gethostbyaddr
inet_addr
ioctlsocket
socket
WSAGetLastError
WSAStartup
__WSAFDIsSet
select
connect
ntohs
getsockopt
setsockopt
inet_ntoa
Sections
.text Size: 620KB - Virtual size: 618KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.textidx Size: 540KB - Virtual size: 539KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
CONST Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 124KB - Virtual size: 458KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fnp_dir Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fnp_mar Size: 4KB - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE