Static task
static1
Behavioral task
behavioral1
Sample
b77a3b4c4fab7c5e1565cbc0ebdc99662946bad6a2eac26696ac9fbb58446f34.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b77a3b4c4fab7c5e1565cbc0ebdc99662946bad6a2eac26696ac9fbb58446f34.exe
Resource
win10v2004-20220901-en
General
-
Target
b77a3b4c4fab7c5e1565cbc0ebdc99662946bad6a2eac26696ac9fbb58446f34
-
Size
277KB
-
MD5
6361bf0135bc35f1462c3e1faf470521
-
SHA1
4e37228232159dbebe77ff189d972eeaadc3998b
-
SHA256
b77a3b4c4fab7c5e1565cbc0ebdc99662946bad6a2eac26696ac9fbb58446f34
-
SHA512
58932056a4c45aa0bd0b74165b8a17f0482250d6d4d13c140430e0bbf4e33f6a7341892d8a19fe16d1fbefd30af685c05cdf9620224d1ea507b35d6401b929de
-
SSDEEP
6144:+JJS/UBfmt0T5GHZwpZwNHWg/YFREgK2bI:uwU3GHy0HW8+REv2E
Malware Config
Signatures
Files
-
b77a3b4c4fab7c5e1565cbc0ebdc99662946bad6a2eac26696ac9fbb58446f34.exe windows x86
357e24ec8637acff2bc9b2ffa0964b9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pncrt
_controlfp
??1type_info@@UAE@XZ
fclose
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_XcptFilter
_purecall
_acmdln
exit
__dllonexit
_exit
_onexit
_CxxThrowException
__CxxFrameHandler
??1exception@@UAE@XZ
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
wcstok
_wcsdup
wcscat
wcscpy
time
vsprintf
gmtime
asctime
_ismbcspace
malloc
realloc
free
_vsnprintf
_stricmp
_mbctype
memmove
strstr
??2@YAPAXI@Z
_putenv
fprintf
fseek
strncpy
_control87
strchr
sprintf
printf
atoi
strrchr
getenv
strtok
strtoul
??3@YAXPAX@Z
wcslen
fopen
ole32
OleInitialize
OleUninitialize
version
GetFileVersionInfoA
VerQueryValueA
kernel32
CreateDirectoryA
GetCommandLineW
InterlockedExchange
UnmapViewOfFile
FindFirstFileW
Sleep
OpenProcess
IsBadWritePtr
GlobalMemoryStatus
GetThreadContext
WriteFile
VirtualQuery
SetFilePointer
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
CreateThread
SetCurrentDirectoryA
SetUnhandledExceptionFilter
TerminateThread
GetVersion
GetSystemInfo
WideCharToMultiByte
FindClose
CreateFileA
GetVersionExA
GetProcAddress
GetStartupInfoA
GetModuleHandleA
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
WaitForSingleObject
ReleaseMutex
CloseHandle
GetLastError
CreateMutexA
OpenMutexA
FreeLibrary
MoveFileA
MapViewOfFile
CreateFileMappingA
GetCurrentProcessId
SetErrorMode
DeleteFileA
GetEnvironmentVariableA
InterlockedIncrement
InterlockedDecrement
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
LoadLibraryA
user32
ReleaseDC
CreateWindowExA
RegisterWindowMessageA
DestroyWindow
UnregisterClassA
GetDC
CharPrevA
wsprintfA
CharNextA
GetSystemMetrics
EnumWindows
SendMessageA
GetPropA
DefWindowProcA
SetMessageQueue
PostThreadMessageA
GetClassInfoExA
RegisterClassExA
advapi32
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegOpenKeyA
RegOpenKeyExA
gdi32
GetDeviceCaps
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE