Static task
static1
Behavioral task
behavioral1
Sample
71a94b07cf6b3ff3a8bc3129b265bd6af369ed4cd898a4cdfdc690606e726edb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
71a94b07cf6b3ff3a8bc3129b265bd6af369ed4cd898a4cdfdc690606e726edb.exe
Resource
win10v2004-20220901-en
General
-
Target
71a94b07cf6b3ff3a8bc3129b265bd6af369ed4cd898a4cdfdc690606e726edb
-
Size
143KB
-
MD5
84a7cdfabaf5ff4688996123c54666d0
-
SHA1
1d2fb40294c9ecb0d7356f45a38328dbf9e84278
-
SHA256
71a94b07cf6b3ff3a8bc3129b265bd6af369ed4cd898a4cdfdc690606e726edb
-
SHA512
501ab14ec33415cf9bbe09545554a0408fcae61851777ac48c223af7b570b892a908d100f3c9cfb710386c7300a6ce5d2bdba5f29f14e210a072b3cec8335ccf
-
SSDEEP
3072:JI4UfP3+bFwLiAwgdXm2eU/UpPOtPyAUjJTbt4:m4Z8/UH5C
Malware Config
Signatures
Files
-
71a94b07cf6b3ff3a8bc3129b265bd6af369ed4cd898a4cdfdc690606e726edb.exe windows x86
37a0321d18e1b7d14bdde8d541872359
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
LeaveCriticalSection
WriteFile
ExitProcess
GetVersionExW
CloseHandle
WideCharToMultiByte
GetOEMCP
LCMapStringW
HeapReAlloc
SetFilePointer
DeleteCriticalSection
GetACP
GetModuleFileNameW
CreateThread
GetModuleFileNameA
CreateEventW
GetTickCount
CreateFileA
FreeLibraryAndExitThread
lstrlenW
VirtualAlloc
GetCurrentProcessId
GetModuleHandleW
GetCurrentThread
CreateEventA
InterlockedIncrement
GetCurrentThreadId
GetVersionExA
CompareFileTime
QueryPerformanceCounter
InterlockedDecrement
GetStartupInfoW
GetCurrentDirectoryA
GetCurrentProcess
GetStartupInfoA
CreateMutexA
GetModuleHandleA
GetStdHandle
CompareStringA
GetTimeZoneInformation
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringA
GetLocaleInfoW
GetLocaleInfoA
MultiByteToWideChar
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
VirtualFree
GetSystemTimeAsFileTime
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
GetCPInfo
Sleep
RtlUnwind
HeapSize
SetEnvironmentVariableA
user32
GetSystemMetrics
gdi32
CreateRectRgnIndirect
CreateDIBitmap
SetTextColor
GetDeviceCaps
CreateFontIndirectW
GetStretchBltMode
CreateFontIndirectA
GetStockObject
ExtSelectClipRgn
SetBkColor
SetMapMode
DeleteDC
RectVisible
CreateDIBSection
SetBkMode
GetObjectW
PatBlt
GetClipBox
CreateSolidBrush
LineTo
CreatePalette
CreateCompatibleBitmap
BitBlt
SelectPalette
SelectClipRgn
CreateBitmap
GetTextExtentPoint32W
DeleteObject
CreateCompatibleDC
SetStretchBltMode
SetWindowOrgEx
MoveToEx
ExtTextOutW
Rectangle
RealizePalette
GetObjectA
RestoreDC
ExtTextOutA
CreatePenIndirect
ExtCreatePen
ole32
StgCreateDocfileOnILockBytes
CreateBindCtx
CLSIDFromProgID
CLSIDFromString
OleRun
OleInitialize
CoQueryProxyBlanket
CoTaskMemFree
msi
ord46
shell32
SHFileOperationW
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ