Static task
static1
Behavioral task
behavioral1
Sample
⡮. ᯠ. 2- .࠭-- -쬠.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
⡮. ᯠ. 2- .࠭-- -쬠.exe
Resource
win10v2004-20220812-en
General
-
Target
30ca2881b695d2c43548e1b483011e29a61bc1b3efa0fbd59e4519000fc41756
-
Size
111KB
-
MD5
d1c0022ef7ae73962866ba876c430a32
-
SHA1
0347993bbc3731342a1d75649b63c746ec5cf29b
-
SHA256
30ca2881b695d2c43548e1b483011e29a61bc1b3efa0fbd59e4519000fc41756
-
SHA512
51fbb2eee4607c6b6ab0d00aff713190c30a915fa603b56b4aa0c241ac0952a4041cb2c8d39187287068b8f480537e95afd5ae549808ce71fa565907a17a5050
-
SSDEEP
3072:h0FXD49/zBfjxMbUp1qS0Oh9MPXHcJNbxlfiZmfCoTmJbW:X9/zBftMbUTqS0NHklxkZmaEmdW
Malware Config
Signatures
Files
-
30ca2881b695d2c43548e1b483011e29a61bc1b3efa0fbd59e4519000fc41756.zip
-
⡮. ᯠ. 2- .࠭-- -쬠.exe.exe windows x86
900e8610d734035c52241035c0909b26
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringW
ole32
CoCreateGuid
CoInitialize
CoUninitialize
kernel32
CloseHandle
CreateFileA
DeleteFileA
DeleteFileW
FormatMessageA
FreeEnvironmentStringsA
GetComputerNameA
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceA
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
GetVersionExA
GlobalMemoryStatus
LoadLibraryA
MultiByteToWideChar
QueryPerformanceCounter
SetErrorMode
VirtualProtect
WideCharToMultiByte
WriteFile
lstrlenA
FreeLibrary
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
user32
LoadStringA
SendMessageA
DialogBoxParamA
wininet
InternetQueryOptionA
ulib
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??0ARRAY@@QAE@XZ
??0CLASS_DESCRIPTOR@@QAE@XZ
??0DSTRING@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
??0PATH@@QAE@XZ
??0PROGRAM@@IAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??1ARGUMENT_LEXEMIZER@@UAE@XZ
??1ARRAY@@UAE@XZ
??1DSTRING@@UAE@XZ
??1OBJECT@@UAE@XZ
??1PROGRAM@@UAE@XZ
??1STRING_ARGUMENT@@UAE@XZ
?Compare@OBJECT@@UBEJPBV1@@Z
?DisplayMessage@PROGRAM@@UBAEKW4MESSAGE_TYPE@@PADZZ
?DisplayMessage@PROGRAM@@UBEEKW4MESSAGE_TYPE@@@Z
?DoParsing@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Fatal@PROGRAM@@UBAXKKPADZZ
?Fatal@PROGRAM@@UBEXXZ
?GetStandardError@PROGRAM@@UAEPAVSTREAM@@XZ
?GetStandardInput@PROGRAM@@UAEPAVSTREAM@@XZ
?GetStandardOutput@PROGRAM@@UAEPAVSTREAM@@XZ
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@CLASS_DESCRIPTOR@@QAEEXZ
?Initialize@FLAG_ARGUMENT@@QAEEPAD@Z
?Initialize@STRING_ARGUMENT@@QAEEPAD@Z
?Initialize@WSTRING@@QAEEPBDK@Z
?IsValueSet@ARGUMENT@@QAEEXZ
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
?Put@ARRAY@@UAEEPAVOBJECT@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?Usage@PROGRAM@@UBEXXZ
?ValidateVersion@PROGRAM@@UBEXKK@Z
?QueryFile@SYSTEM@@SGPAVFSN_FILE@@PBVPATH@@EPAE@Z
ntdll
RtlFreeHeap
RtlAllocateHeap
Sections
AUTO Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc2 Size: 189B - Virtual size: 189B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc4 Size: 202B - Virtual size: 202B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc3 Size: 289B - Virtual size: 289B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE