Static task
static1
Behavioral task
behavioral1
Sample
c7fee3a65173cf4fbf6c3101ec7ac5335dec83af18977f255cc2269d3c03fc3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7fee3a65173cf4fbf6c3101ec7ac5335dec83af18977f255cc2269d3c03fc3d.exe
Resource
win10v2004-20220901-en
General
-
Target
c7fee3a65173cf4fbf6c3101ec7ac5335dec83af18977f255cc2269d3c03fc3d
-
Size
1.3MB
-
MD5
0f2b90050f508940e807bc9103b9c500
-
SHA1
d0ed01eeb2e94e437a5a67bba0cfb5d91bf0f53b
-
SHA256
c7fee3a65173cf4fbf6c3101ec7ac5335dec83af18977f255cc2269d3c03fc3d
-
SHA512
7756f9ecd5c75a0e58f1b91037187e331b8027c63e3875d9db2066df9c15cf2bad7c929a0a9b2d56a1cf61cb9d8dfafe3f32636217c17e8419f0cce6741b7cae
-
SSDEEP
12288:NdpJ16Gna4i6REllPaa5LiIU/fsh4V6jnB0KJFx+I3IxAOzK6+44EwgwIVM12cnu:NdpJxZsllG
Malware Config
Signatures
Files
-
c7fee3a65173cf4fbf6c3101ec7ac5335dec83af18977f255cc2269d3c03fc3d.exe windows x86
8056a0dd1801858eacfb684462e97775
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegEnumKeyW
RegEnumKeyExW
RegDeleteKeyW
RegFlushKey
RegDeleteValueW
RegNotifyChangeKeyValue
kernel32
InitializeCriticalSection
GetFileAttributesW
GetModuleFileNameW
DeleteCriticalSection
CloseHandle
HeapFree
HeapAlloc
GetProcessHeap
lstrcpyW
lstrcmpW
GetWindowsDirectoryW
CompareFileTime
lstrlenA
GetVersionExW
WaitForMultipleObjects
WaitForSingleObject
SetEvent
GetCurrentThreadId
FreeLibrary
LoadLibraryW
Sleep
GetCommandLineW
CreateEventW
GetSystemInfo
GetFullPathNameW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapReAlloc
RtlUnwind
ExitThread
TlsSetValue
TlsGetValue
GetLastError
CreateThread
InterlockedDecrement
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetCurrentDirectoryW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsFree
SetLastError
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InterlockedExchange
VirtualQuery
GetStringTypeA
GetStringTypeW
VirtualProtect
MultiByteToWideChar
IsBadReadPtr
IsBadCodePtr
SetFilePointer
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
CreateFileW
SetEndOfFile
ReadFile
GetEnvironmentStrings
GetSystemDirectoryW
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
lstrlenW
ExitProcess
gdi32
GetTextExtentPointW
user32
GetKeyState
DestroyWindow
MessageBoxA
wsprintfA
LoadStringA
SetDlgItemTextW
ShowWindow
CheckDlgButton
SetWindowTextW
ReleaseDC
GetDC
SetDlgItemInt
GetDlgItemInt
GetDlgItemTextW
CheckRadioButton
LoadIconW
SetForegroundWindow
KillTimer
SetTimer
SetFocus
CallNextHookEx
IsWindowEnabled
AdjustWindowRectEx
GetWindowRect
CreateDialogParamW
GetClientRect
UpdateWindow
PostQuitMessage
UnhookWindowsHookEx
SetWindowsHookExW
DispatchMessageW
TranslateMessage
IsDialogMessageW
PeekMessageW
MsgWaitForMultipleObjects
GetDesktopWindow
LoadStringW
MessageBoxW
GetDlgItem
SendMessageW
EnableWindow
GetWindowLongW
DialogBoxParamW
SetWindowPos
PostMessageW
EndDialog
GetFocus
wsprintfW
comctl32
ImageList_ReplaceIcon
ImageList_Create
ord17
ImageList_Destroy
comdlg32
GetSaveFileNameW
shell32
ShellExecuteW
ole32
CoInitializeSecurity
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE