Static task
static1
Behavioral task
behavioral1
Sample
7dc463858be559a9979fe54f0e0332ac482854a37f45647472f6f08d7405ef5f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7dc463858be559a9979fe54f0e0332ac482854a37f45647472f6f08d7405ef5f.exe
Resource
win10v2004-20220901-en
General
-
Target
7dc463858be559a9979fe54f0e0332ac482854a37f45647472f6f08d7405ef5f
-
Size
971KB
-
MD5
80be2caeb5331a6e64939c7771963900
-
SHA1
05e29c515e7a0ebc0564580a4d07da88510a65ab
-
SHA256
7dc463858be559a9979fe54f0e0332ac482854a37f45647472f6f08d7405ef5f
-
SHA512
8697ae8a1c84332e95521f66d592e565523924dd96ae6f68750cb36aa50aac935fe77cf7007ce4c721df9cb182ad4f875868e3b363eb881a1ef2476fd60bfafc
-
SSDEEP
24576:4MvaQpIHxv7UIfnLfsUgNUa/YZilrgCiJHYVC:4MiQpI66YUva/Y4a5OC
Malware Config
Signatures
Files
-
7dc463858be559a9979fe54f0e0332ac482854a37f45647472f6f08d7405ef5f.exe windows x86
1626c608a2c2c6430c3771205605fe5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
EnterCriticalSection
Sleep
GetFileSize
CloseHandle
UnmapViewOfFile
LoadLibraryA
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
GetProcAddress
VirtualFree
GetLastError
GetModuleHandleExW
IsBadReadPtr
GetFullPathNameW
GetFileAttributesExW
SetLastError
HeapFree
DeleteFileA
ExitProcess
TerminateProcess
SetUnhandledExceptionFilter
GetProcessId
WaitForSingleObject
GetLocalTime
SystemTimeToFileTime
GetTickCount
CreateProcessW
GetTempPathA
GetTempFileNameA
MoveFileExA
AddVectoredExceptionHandler
GetCurrentProcessId
GetCurrentThread
GetThreadContext
CreateDirectoryA
RemoveDirectoryA
GetFileAttributesA
MultiByteToWideChar
WideCharToMultiByte
CreateFileW
WriteConsoleW
HeapAlloc
FreeLibrary
WriteFile
InterlockedCompareExchange
FlushFileBuffers
LeaveCriticalSection
DeleteCriticalSection
RaiseException
RtlUnwind
GetCommandLineA
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
IsProcessorFeaturePresent
HeapSize
IsDebuggerPresent
GetCurrentThreadId
VirtualQuery
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetConsoleMode
SetFilePointerEx
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
LCMapStringW
HeapReAlloc
GetConsoleCP
GetStringTypeW
SetStdHandle
user32
MessageBoxA
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteExW
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 779KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ