Static task
static1
Behavioral task
behavioral1
Sample
wfrrkvvx.exe
Resource
win7-20220812-en
General
-
Target
wfrrkvvx.exe
-
Size
1.8MB
-
MD5
2ac6d3832ea60acf4e1bafe3ed4081a1
-
SHA1
7fb64960288a64b4fce3aee650d2d84efb9a8f8f
-
SHA256
7e1f0af96408d36f43a2325adc3b36fe795f9e579befdabd4210ede420c9905d
-
SHA512
81c987aeb547fdf2449ee75c19e7476117a9eadc90cd0ccace0483f1d8863cd5d6f67b50ea8f4f6cb1783c3f92ac91d19364eee83a74dfa9be13a919047ebdda
-
SSDEEP
49152:uQlnpoyJwlry1E5ck54NpY6Y9xARpeMyn1obTis6yHX:uQlnpoyeryui822U/tmIB6
Malware Config
Signatures
Files
-
wfrrkvvx.exe.exe windows x86
Password: infected
f4dd2fc3c2bc0f7f37512a211d153f86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetComputerNameA
FindFirstChangeNotificationW
lstrlenA
GetConsoleAliasesLengthW
CopyFileExW
TlsGetValue
CommConfigDialogA
BuildCommDCBAndTimeoutsA
FreeLibrary
SetDllDirectoryW
InterlockedIncrement
InterlockedDecrement
ZombifyActCtx
SetFirmwareEnvironmentVariableA
SetEnvironmentVariableW
GetNamedPipeHandleStateA
GetProfileSectionA
SetVolumeMountPointW
GetTickCount
GetProcessHeap
GetPrivateProfileStringW
GetConsoleTitleA
ReadConsoleW
CreateRemoteThread
GetSystemWow64DirectoryA
CreateActCtxW
TlsSetValue
GetConsoleCP
GetPrivateProfileIntA
SetFileShortNameW
GetConsoleMode
TerminateThread
CopyFileW
GetCalendarInfoA
GetVersionExW
LeaveCriticalSection
GlobalFlags
HeapValidate
VerifyVersionInfoA
IsDBCSLeadByte
GetModuleFileNameW
GetEnvironmentVariableA
CompareStringW
GetStartupInfoW
CreateJobObjectA
VerifyVersionInfoW
SetCurrentDirectoryA
GetLastError
GetLongPathNameW
GetProcAddress
HeapSize
BackupWrite
VerLanguageNameA
CreateNamedPipeA
SearchPathA
GetNumaHighestNodeNumber
GetPrivateProfileStringA
LoadLibraryA
ProcessIdToSessionId
LocalAlloc
GetFileType
WritePrivateProfileStringA
GetVolumePathNamesForVolumeNameA
GetModuleFileNameA
WriteProfileStringA
GetModuleHandleA
FindFirstChangeNotificationA
GetProcessShutdownParameters
FreeEnvironmentStringsW
WriteProfileStringW
BuildCommDCBA
GetConsoleCursorInfo
OutputDebugStringA
FindFirstVolumeA
TlsAlloc
GetWindowsDirectoryW
ReadConsoleOutputCharacterW
TlsFree
CopyFileExA
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
GetCurrentThreadId
GetModuleHandleW
SetLastError
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
IsBadReadPtr
HeapCreate
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
LoadLibraryW
HeapAlloc
HeapReAlloc
HeapQueryInformation
HeapFree
RaiseException
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
WriteConsoleW
OutputDebugStringW
SetFilePointer
SetStdHandle
CreateFileW
CloseHandle
FlushFileBuffers
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 39.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sexonug Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 993B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tedu Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zole Size: 512B - Virtual size: 234B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ