Static task
static1
Behavioral task
behavioral1
Sample
7cfe991d988bee8ec9a733381308d12185b2f1abc8b5c534bea8adf619af027c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cfe991d988bee8ec9a733381308d12185b2f1abc8b5c534bea8adf619af027c.exe
Resource
win10v2004-20220812-en
General
-
Target
7cfe991d988bee8ec9a733381308d12185b2f1abc8b5c534bea8adf619af027c
-
Size
548KB
-
MD5
6c444871f3ffab6675339c51631152d0
-
SHA1
574eba1e0ff58769cc7df1bce8cea52329a1f190
-
SHA256
7cfe991d988bee8ec9a733381308d12185b2f1abc8b5c534bea8adf619af027c
-
SHA512
a7b66dc44f332b1f91fe9cbb0f3c4f4376d85a18769d363b3c1f03e458ad02fdc5d00b39e607f55227a15a34226f829d810e03bbe287ca00242f96df265a3c75
-
SSDEEP
12288:JYFspGqJtygevFrkAYQb2yQWdYLDQJi37WDtYoADmXhSn:JVjyNnLQWeqVHSn
Malware Config
Signatures
Files
-
7cfe991d988bee8ec9a733381308d12185b2f1abc8b5c534bea8adf619af027c.exe windows x86
9aa054fb2c031461d9ed3a067526ee96
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
GetCurrentDirectoryW
WaitForMultipleObjects
ReleaseMutex
InitializeCriticalSectionAndSpinCount
GetVolumeInformationW
CreateMutexW
ReadProcessMemory
ConnectNamedPipe
WaitForSingleObject
GetThreadPriority
InterlockedDecrement
GetLastError
WriteFile
DeleteFileW
GetSystemTimeAsFileTime
GetSystemDirectoryW
HeapAlloc
GetSystemPowerStatus
RemoveDirectoryW
LocalAlloc
GetFileAttributesW
GetDiskFreeSpaceW
SwitchToThread
GetProcAddress
CreateEventW
SetUnhandledExceptionFilter
SetErrorMode
WaitForSingleObjectEx
FlushViewOfFile
ResetEvent
GetLogicalDrives
LoadLibraryExW
GetVersionExW
FormatMessageW
SetFilePointer
PeekNamedPipe
GetThreadLocale
GetTickCount
DeleteCriticalSection
GetCurrentThread
LocalFree
VirtualUnlock
GetCurrentProcessId
WideCharToMultiByte
IsDBCSLeadByteEx
GetComputerNameW
SetThreadLocale
SetLastError
MapViewOfFile
GetOverlappedResult
SetProcessWorkingSetSize
WriteFileEx
HeapSize
CompareFileTime
SetNamedPipeHandleState
GetLongPathNameW
ReadFile
FreeLibrary
GetSystemInfo
OpenFileMappingW
GlobalLock
LocalFileTimeToFileTime
CreateFileMappingW
OpenEventW
SetPriorityClass
GetCPInfo
SetEvent
InterlockedIncrement
HeapFree
TransactNamedPipe
OpenProcess
ExpandEnvironmentStringsW
FlushFileBuffers
UnmapViewOfFile
SleepEx
GetCalendarInfoW
WaitForMultipleObjectsEx
VirtualFree
GlobalAlloc
CreateDirectoryW
EnterCriticalSection
CreateNamedPipeW
FoldStringW
IsValidLocale
GetDiskFreeSpaceExW
SetFileAttributesW
CompareStringW
GetModuleFileNameW
DuplicateHandle
CreateThread
QueryDosDeviceW
GetStringTypeW
SetEndOfFile
CloseHandle
GetFileAttributesExW
InterlockedExchange
LeaveCriticalSection
HeapCreate
FindNextFileW
SearchPathW
ReadFileEx
GetThreadTimes
MultiByteToWideChar
GetFileSize
SetThreadPriority
WaitNamedPipeW
QueueUserAPC
ResumeThread
lstrlenA
HeapDestroy
CancelIo
SystemTimeToFileTime
GetSystemDefaultLCID
GlobalFree
IsBadWritePtr
GetExitCodeProcess
TryEnterCriticalSection
FileTimeToSystemTime
FindClose
CreateFileW
SetCurrentDirectoryW
GetDriveTypeW
DisconnectNamedPipe
GetSystemTime
GetACP
QueryPerformanceCounter
GlobalUnlock
LCMapStringW
LoadLibraryA
GetUserDefaultLCID
GetCurrentProcess
FindFirstFileW
GetLocaleInfoW
GetOEMCP
DeviceIoControl
advapi32
RegConnectRegistryW
LsaOpenSecret
SetSecurityDescriptorOwner
GetNamedSecurityInfoW
LsaOpenPolicy
RegisterServiceCtrlHandlerExW
ImpersonateNamedPipeClient
RegDeleteValueW
GetLengthSid
ImpersonateLoggedOnUser
ChangeServiceConfigW
QueryServiceStatus
OpenThreadToken
LsaSetSecret
RegQueryInfoKeyW
RevertToSelf
RegEnumKeyExW
RegEnumKeyW
LsaRetrievePrivateData
ReportEventW
RegQueryValueExW
RegOpenKeyExW
InitializeSecurityDescriptor
OpenSCManagerW
RegSetValueExW
SetNamedSecurityInfoW
LsaNtStatusToWinError
CopySid
SetSecurityDescriptorDacl
LogonUserW
SetFileSecurityW
SetSecurityDescriptorSacl
RegCreateKeyExW
SetSecurityDescriptorGroup
AccessCheck
AllocateAndInitializeSid
RegDeleteKeyW
QueryServiceConfigW
AddAccessAllowedAce
RegOpenKeyW
LsaCreateSecret
FreeSid
OpenServiceW
GetUserNameW
SetServiceStatus
RegOpenKeyA
RegisterEventSourceW
StartServiceW
RegCloseKey
GetSecurityDescriptorLength
RegEnumValueW
InitializeAcl
CloseServiceHandle
AddAce
DeregisterEventSource
ControlService
LsaClose
LsaFreeMemory
msvcrt
_wfopen
iswalpha
strncpy
__CxxFrameHandler
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
mbstowcs
free
fgets
_itow
_strnicmp
iswspace
toupper
isalpha
wcscat
isdigit
memmove
??1type_info@@UAE@XZ
_CxxThrowException
wcschr
wcslen
isxdigit
_wcsnicmp
_wcslwr
realloc
wcstombs
strtoul
wcsrchr
_ftol
qsort
wcscpy
wcstol
??3@YAXPAX@Z
fclose
_wcsicmp
wcstod
?terminate@@YAXXZ
_wcsupr
_ultow
wcstoul
_except_handler3
towlower
_initterm
wcsncpy
_stricmp
wcscspn
strcspn
wcscmp
_wsplitpath
iswdigit
malloc
__dllonexit
_adjust_fdiv
wcsspn
wcsncmp
towupper
sprintf
strchr
swscanf
_onexit
bsearch
swprintf
_errno
wcsstr
user32
RegisterDeviceNotificationW
PeekMessageW
DispatchMessageW
TranslateMessage
wsprintfW
GetLastInputInfo
MsgWaitForMultipleObjects
UnregisterDeviceNotification
ole32
StgOpenStorage
StgPropertyLengthAsVariant
StringFromGUID2
CreateStreamOnHGlobal
PropSysAllocString
CoFileTimeNow
StgConvertVariantToProperty
CoTaskMemAlloc
CoUninitialize
CoFreeUnusedLibraries
CLSIDFromString
CoGetClassObject
PropVariantClear
PropSysFreeString
CreateBindCtx
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoSetProxyBlanket
FreePropVariantArray
PropVariantCopy
GetClassFile
StgConvertPropertyToVariant
ntdll
NtNotifyChangeDirectoryFile
NtQuerySystemInformation
RtlInitUnicodeString
NtQueryVolumeInformationFile
RtlNtStatusToDosError
NtOpenThreadToken
NtQuerySecurityObject
NtOpenProcessToken
RtlCaptureStackBackTrace
RtlUnicodeStringToOemString
NtDeviceIoControlFile
NtWaitForSingleObject
NtFsControlFile
NtDuplicateToken
RtlInitAnsiString
NtSetInformationFile
NtClose
RtlQueryRegistryValues
NtOpenKey
NtQueryInformationFile
NtQuerySystemTime
NtQueryDirectoryFile
NtNotifyChangeKey
RtlFreeHeap
NtCreateFile
RtlUpcaseUnicodeChar
RtlDosPathNameToNtPathName_U
NtQueryInformationToken
NtQueryInformationProcess
NtCancelIoFile
RtlOemStringToUnicodeString
NtCreateEvent
NtOpenFile
rpcrt4
CStdStubBuffer_QueryInterface
NdrCStdStubBuffer_Release
CStdStubBuffer_AddRef
CStdStubBuffer_Invoke
IUnknown_QueryInterface_Proxy
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_DebugServerRelease
NdrDllGetClassObject
CStdStubBuffer_Disconnect
NdrDllUnregisterProxy
NdrDllRegisterProxy
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
UuidFromStringW
CStdStubBuffer_Connect
CStdStubBuffer_DebugServerQueryInterface
NdrOleFree
NdrOleAllocate
shell32
SHGetDesktopFolder
SHBindToParent
Sections
.9618ds Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.B^br5 Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.@#RFER Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.N^UHQt Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.h46asrg Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.64h4aer Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE