Static task
static1
Behavioral task
behavioral1
Sample
177343c71d368413de677e3ea78cf4aa1d6987a48ebcf00a8034a269063c438c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
177343c71d368413de677e3ea78cf4aa1d6987a48ebcf00a8034a269063c438c.exe
Resource
win10v2004-20220901-en
General
-
Target
177343c71d368413de677e3ea78cf4aa1d6987a48ebcf00a8034a269063c438c
-
Size
108KB
-
MD5
a35d54d2edca13f3f15f4524c4fa0690
-
SHA1
f2f9e2f469305e23a928b78eb6610c8a850cf5d2
-
SHA256
177343c71d368413de677e3ea78cf4aa1d6987a48ebcf00a8034a269063c438c
-
SHA512
0ace57369e5d435ba0242fbeeabbb04863eee96e38c64a1316a4ecd77149576f5c8041a893e44536f5c1f0b4e851da8ec4ebacfc82aafbf90540cfc0c8866a44
-
SSDEEP
1536:s0ECEiVehL98YJk7nlfCTHGZ0JyIm54Z9Oq/Wc:s07Ven8YJkpCHNJyI64jOPc
Malware Config
Signatures
Files
-
177343c71d368413de677e3ea78cf4aa1d6987a48ebcf00a8034a269063c438c.exe windows x86
d67a47f5a24b521d0c3ec768f66fd42f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??2@YAPAXI@Z
_vsnprintf
malloc
free
_ftol
_itow
??3@YAXPAX@Z
_except_handler3
wcsrchr
kernel32
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetCurrentProcessId
GetPrivateProfileIntA
GetTickCount
GetPrivateProfileStringW
GetPrivateProfileStringA
GetFullPathNameW
GetFullPathNameA
GetLocaleInfoA
lstrlenA
GetPrivateProfileIntW
GetCurrentThreadId
lstrcpyA
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
FreeLibrary
GetSystemDirectoryA
QueryPerformanceCounter
GetModuleHandleA
GetCommandLineW
GetCommandLineA
MultiByteToWideChar
ExitProcess
GetStdHandle
lstrlenW
WideCharToMultiByte
GetLastError
WriteConsoleW
WriteFile
GetFileType
GetFileSize
CreateFileW
CreateEventA
GetCPInfo
GetACP
FindClose
FindFirstFileA
GetFileAttributesA
FindFirstFileW
GetFileAttributesW
LocalFree
FormatMessageA
LocalAlloc
FormatMessageW
GetProcAddress
LoadLibraryA
InitializeCriticalSection
GetModuleFileNameA
GetModuleFileNameW
DeleteCriticalSection
SetEvent
CloseHandle
CreateThread
GetTempPathA
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
InterlockedIncrement
InterlockedDecrement
GetUserDefaultLCID
FlushFileBuffers
CreateFileA
GetTempFileNameA
oleaut32
SysFreeString
SafeArrayCopy
LoadRegTypeLi
SafeArrayCreate
SafeArrayPutElement
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetElement
VariantChangeType
LoadTypeLi
VariantInit
VariantCopy
VariantClear
SysAllocStringByteLen
SysAllocStringLen
CreateErrorInfo
SetErrorInfo
SysAllocString
SysStringLen
SafeArrayGetLBound
ole32
CreateFileMoniker
CoCreateInstance
CoInitializeSecurity
CreateBindCtx
CoRegisterMessageFilter
CLSIDFromString
CoInitialize
CoUninitialize
CoGetClassObject
MkParseDisplayName
CLSIDFromProgID
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueW
imm32
ImmGetDefaultIMEWnd
advapi32
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegCreateKeyExW
RegCreateKeyExA
RegOpenKeyExW
RegOpenKeyExA
ImpersonateLoggedOnUser
IsTextUnicode
RegisterEventSourceW
GetUserNameW
LookupAccountNameW
ReportEventW
DeregisterEventSource
RegCloseKey
RegSetValueExW
user32
LoadStringA
LoadStringW
CharNextA
GetActiveWindow
GetClassInfoA
RegisterClassA
CreateWindowExA
GetMessageA
GetWindowLongA
SetWindowLongA
SetTimer
DefWindowProcA
PostQuitMessage
KillTimer
EnumThreadWindows
IsWindowVisible
PostMessageA
SendMessageA
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
wsprintfW
wsprintfA
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BadDay Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE