Static task
static1
Behavioral task
behavioral1
Sample
0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe
Resource
win10v2004-20220812-en
General
-
Target
0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21
-
Size
261KB
-
MD5
96e5a9de91aa21b8d59e5680bc8e98a0
-
SHA1
f7ec2873abc2ad78587f2affbdb6e9ae5e876017
-
SHA256
0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21
-
SHA512
5dc639d23bc8a108999ad59b1383f5078bc5caf70c4ef0fea4f6189e9b0ae8454a1a514814bc7be843c79f5685bfae7433af90161f4949662adcb17fbda3da6b
-
SSDEEP
6144:lFcHD8/oPXwlhYtkRnLbstrHxrLWpwcHA6Q8o+mEX8YG:wLXdtkRnM5pLWOF6QkX8Y
Malware Config
Signatures
Files
-
0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe windows x86
7ee37a8fd00bd890d6315bb3fe29c5e0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetCommandLineA
ExpandEnvironmentStringsW
ReleaseMutex
FreeLibrary
VirtualQuery
SetConsoleTitleA
DeviceIoControl
SetEvent
FlushFileBuffers
FileTimeToSystemTime
CreateEventA
GetEnvironmentVariableA
CopyFileA
GetConsoleTitleA
Beep
GetTimeFormatA
MoveFileExA
GetDiskFreeSpaceExA
GetTickCount
IsBadWritePtr
GetModuleHandleA
SetVolumeLabelA
GetCurrentThread
GetComputerNameA
ResumeThread
SystemTimeToFileTime
SetFilePointer
LocalLock
GetACP
SetLastError
GetPriorityClass
QueryPerformanceCounter
WaitForSingleObject
CreateProcessA
GetModuleFileNameA
GetCompressedFileSizeA
Sleep
CreateFileMappingA
CreateMutexA
CloseHandle
LocalAlloc
GetFileType
SearchPathA
FreeConsole
GetProcAddress
GetUserDefaultLangID
GetLastError
CreateFileA
ReleaseSemaphore
GetVersion
WriteFile
DeleteFileA
FormatMessageA
SetUnhandledExceptionFilter
GetLogicalDriveStringsA
LockResource
QueryDosDeviceA
LockFile
LocalUnlock
DebugBreak
MultiByteToWideChar
MulDiv
VirtualProtectEx
GetCurrentThreadId
TerminateThread
InitializeCriticalSection
FindFirstFileA
HeapWalk
FindClose
CreateThread
ReadFile
DefineDosDeviceA
InterlockedDecrement
GetCurrentProcessId
QueryPerformanceFrequency
GetLocalTime
GetFileSize
LoadResource
FindNextFileA
SetPriorityClass
lstrlenA
InterlockedIncrement
EnterCriticalSection
GetSystemDirectoryA
CreateSemaphoreA
GetProcessHeap
GetDriveTypeA
GetDateFormatA
SetEndOfFile
SetThreadPriority
GetCurrentProcess
GetExitCodeProcess
SetFileAttributesA
GetConsoleScreenBufferInfo
GetStdHandle
SizeofResource
GetFullPathNameA
FindResourceA
GetFileAttributesA
GetLogicalDrives
SetErrorMode
GetCurrentDirectoryA
SetFileTime
GetWindowsDirectoryA
GetSystemDefaultLangID
GetVolumeInformationA
HeapValidate
VirtualAlloc
GetFileAttributesExA
MapViewOfFile
SetConsoleCtrlHandler
DuplicateHandle
GetDiskFreeSpaceA
GetVersionExA
VirtualFree
GetSystemTimeAsFileTime
OpenProcess
GetSystemInfo
OpenEventA
DeleteCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalFree
ExitThread
user32
GetKeyState
GetWindowLongA
GetDlgItemInt
SetFocus
DefWindowProcA
RedrawWindow
BroadcastSystemMessageA
GetDC
IsDlgButtonChecked
GetWindowRect
TrackPopupMenu
SetWindowLongA
GetDlgItem
CheckDlgButton
wvsprintfA
KillTimer
LoadIconA
GetKeyboardLayout
BeginPaint
SetCursor
CreateWindowExA
ReleaseDC
ShowWindow
TrackMouseEvent
IsWindowVisible
GetSystemMetrics
SendMessageA
SetScrollInfo
GetDlgItemTextA
ScreenToClient
GetActiveWindow
GetParent
SetWindowPos
LoadCursorA
SetForegroundWindow
CallWindowProcA
DestroyWindow
DrawIcon
UpdateWindow
CreatePopupMenu
SetWindowTextA
gdi32
RoundRect
CreatePen
SetBkColor
MoveToEx
LineTo
CreateFontIndirectA
DeleteObject
SetBkMode
GetTextExtentPoint32A
SetTextColor
DeleteDC
CreateSolidBrush
CreateBrushIndirect
TextOutA
CreateDCA
SelectClipRgn
SelectObject
GetStockObject
CreateRectRgn
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
ImpersonateLoggedOnUser
LogonUserA
RegCloseKey
CreateServiceA
LookupPrivilegeValueA
LogonUserW
CloseServiceHandle
OpenProcessToken
OpenSCManagerA
QueryServiceStatus
DeleteService
RegEnumKeyExA
RegFlushKey
RegSetValueA
RegCreateKeyA
RegUnLoadKeyA
StartServiceA
ControlService
GetSecurityInfo
AllocateAndInitializeSid
RegLoadKeyA
SetSecurityInfo
AdjustTokenPrivileges
RegDeleteValueA
GetUserNameA
RegEnumValueA
SetEntriesInAclA
RegEnumKeyA
RegOpenKeyA
RegQueryValueExA
OpenServiceA
RegDeleteKeyA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHChangeNotify
ShellExecuteExA
ShellExecuteA
SHBrowseForFolderA
ole32
CoInitializeSecurity
CoInitializeEx
CoUninitialize
oleaut32
SysFreeString
comctl32
ord17
msvcrt
_except_handler3
_wcslwr
wcsstr
toupper
bsearch
strcmp
fprintf
strchr
strncpy
localtime
_initterm
tolower
time
atol
__setusermatherr
_close
strrchr
mbstowcs
_snwprintf
strlen
system
free
_exit
realloc
_makepath
strncmp
_adjust_fdiv
exit
fwrite
_write
longjmp
rewind
_ftol
_snprintf
_ui64toa
__p__commode
__p__fmode
asctime
memmove
setvbuf
__p___initenv
_msize
_open
_lrotl
_isatty
??3@YAXPAX@Z
fclose
_fullpath
_kbhit
isprint
wcslen
__dllonexit
strncat
fflush
memcpy
fread
_spawnlp
_strdup
sprintf
memcmp
_controlfp
_onexit
_lseek
_wsplitpath
isalnum
__set_app_type
isalpha
swprintf
fgets
_strnicmp
_access
isupper
_beginthread
wcscmp
rand
_getche
calloc
strstr
_filelength
vprintf
_stat
_setjmp3
_vsnprintf
_fileno
_strlwr
wcscat
__getmainargs
qsort
putchar
sscanf
srand
strcat
_XcptFilter
??2@YAPAXI@Z
_local_unwind2
_iob
_unlink
malloc
_read
_memicmp
_getch
atoi
isdigit
_stricmp
_wcsicmp
strcpy
memset
_splitpath
wcstombs
printf
fopen
__CxxFrameHandler
Sections
CODE Size: 206KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ