Static task
static1
Behavioral task
behavioral1
Sample
7cc80ce5a926d6d6d6f3637c34dcc4d840dee0fc02099383f299eb8af10d8364.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cc80ce5a926d6d6d6f3637c34dcc4d840dee0fc02099383f299eb8af10d8364.exe
Resource
win10v2004-20220901-en
General
-
Target
7cc80ce5a926d6d6d6f3637c34dcc4d840dee0fc02099383f299eb8af10d8364
-
Size
225KB
-
MD5
10c4dee4314e33978b02c4cc502cd090
-
SHA1
f46c614f85cf4b2358f40ed22f6c1eacd27fe27b
-
SHA256
7cc80ce5a926d6d6d6f3637c34dcc4d840dee0fc02099383f299eb8af10d8364
-
SHA512
00228c3223cd51ad96fa9cc2cd299db5d7dae79c56bbcc7a5dbdfd2b4ee5794f4bae286ddf59782d1a935c99bee386da1c231ec2997f7ea547771b469fea6235
-
SSDEEP
6144:KfMeASd/lPFBqTx7Dx5Tx3EEMFQ23/B/oZWf:KERS1lrk5F3wF5PBwg
Malware Config
Signatures
Files
-
7cc80ce5a926d6d6d6f3637c34dcc4d840dee0fc02099383f299eb8af10d8364.exe windows x86
395dabdf1de67cd2fa27649c706c5175
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalFree
GetProcessHeap
HeapAlloc
HeapFree
CreateEventA
GetLocalTime
MoveFileA
ExitProcess
OpenProcess
VirtualAllocEx
GetCurrentProcess
CreateProcessA
SetLastError
GetStartupInfoA
SetFilePointer
ReadFile
WriteFile
RemoveDirectoryA
GetProcAddress
LocalAlloc
LocalFree
GetDriveTypeA
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
lstrcatA
SetErrorMode
ReleaseMutex
CopyFileA
GetModuleFileNameA
OutputDebugStringA
GetTickCount
GetLastError
InterlockedExchange
GetPrivateProfileSectionNamesA
lstrlenA
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
Sleep
CloseHandle
LoadLibraryA
GetModuleHandleA
user32
SetCursorPos
CloseClipboard
EmptyClipboard
OpenClipboard
GetSystemMetrics
LoadCursorA
ReleaseDC
WindowFromPoint
GetKeyState
SetRect
GetCursorPos
wsprintfA
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
GetDC
SetCapture
IsWindow
DispatchMessageA
TranslateMessage
GetForegroundWindow
GetWindowTextA
CharNextA
GetMessageA
GetDesktopWindow
SendMessageA
CloseWindow
CreateWindowExA
OpenDesktopA
GetThreadDesktop
gdi32
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
RegOpenKeyA
DeleteService
CloseServiceHandle
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegCreateKeyExA
AdjustTokenPrivileges
OpenProcessToken
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
ControlService
shell32
SHGetFileInfoA
msvcrt
_strnicmp
calloc
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_strupr
_beginthreadex
strncat
strtok
_errno
atoi
strncmp
rename
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
strcat
strcpy
strlen
memmove
_CxxThrowException
ceil
_ftol
strstr
memcmp
strchr
malloc
strcmp
free
_except_handler3
strrchr
shlwapi
SHDeleteKeyA
ws2_32
getpeername
accept
listen
WSAStartup
sendto
recvfrom
__WSAFDIsSet
gethostname
bind
getsockname
inet_addr
inet_ntoa
send
select
ntohs
socket
gethostbyname
htons
WSACleanup
setsockopt
connect
closesocket
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
uy1433 Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE