Static task
static1
Behavioral task
behavioral1
Sample
3c7cad87a7df1841a821076d272f9b1fae8aa64b7cc8a568575a413959967888.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c7cad87a7df1841a821076d272f9b1fae8aa64b7cc8a568575a413959967888.exe
Resource
win10v2004-20220901-en
General
-
Target
3c7cad87a7df1841a821076d272f9b1fae8aa64b7cc8a568575a413959967888
-
Size
510KB
-
MD5
a20230ab31c946a530fd0e4b9ce1e330
-
SHA1
87902e350ac4f4687ee6b52db2fa00965fb08d0e
-
SHA256
3c7cad87a7df1841a821076d272f9b1fae8aa64b7cc8a568575a413959967888
-
SHA512
7e87cb38b13d3f8df5a1b5fb478fcba4931612328caff8ac8f2fd9589dc5eaef5701ebb90e5ee8fa1441886cc423f6dd2c5912d0bc375c9b76c39e6e56075b1e
-
SSDEEP
12288:km46I+zuIxxCgz+hzXm616Z6MVMl1nuaT:kFsuGgzm46Z6MV61nua
Malware Config
Signatures
Files
-
3c7cad87a7df1841a821076d272f9b1fae8aa64b7cc8a568575a413959967888.exe windows x86
de46e8d8c4926607d71622fc718f06af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleCtrlHandler
LocalFree
FormatMessageW
CloseHandle
GetCurrentProcess
CreateFileW
BackupRead
BackupSeek
SetFileTime
MoveFileW
FlushFileBuffers
SetFilePointer
SetEndOfFile
GetFileTime
GetFileType
CreateFileA
ReadFile
WriteFile
GetDriveTypeA
GetDiskFreeSpaceA
GetVolumeInformationA
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
MoveFileA
DeleteFileA
DeleteFileW
RemoveDirectoryA
RemoveDirectoryW
DeviceIoControl
CreateDirectoryA
CreateDirectoryW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
FindClose
FindNextFileA
FindFirstFileA
FindNextFileW
FindFirstFileW
GetVersionExW
CreateThread
Sleep
GetProcessAffinityMask
WaitForSingleObject
SetEvent
ResetEvent
SetThreadPriority
GetCurrentThread
WaitForMultipleObjects
CreateEventW
GetFullPathNameA
GetFullPathNameW
GetModuleFileNameA
GetModuleFileNameW
MultiByteToWideChar
SetErrorMode
FreeLibrary
LoadLibraryW
LoadLibraryExW
GetCurrentProcessId
CompareStringA
SetPriorityClass
SetCurrentDirectoryA
GetCurrentDirectoryA
LocalFileTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
WideCharToMultiByte
CompareStringW
IsDBCSLeadByte
GetCPInfo
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetEnvironmentVariableA
GetLocaleInfoA
GetLastError
GetCurrentDirectoryW
GetTickCount
GetSystemTime
SystemTimeToFileTime
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleW
GetCommandLineW
GetModuleHandleW
GetProcAddress
ExitThread
SetLastError
GetStringTypeW
GetStringTypeA
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwind
ExitProcess
RaiseException
GetCommandLineA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
user32
CharLowerW
ExitWindowsEx
CharUpperA
CharLowerA
LoadStringW
CharUpperW
CharToOemBuffW
CharToOemA
OemToCharA
OemToCharBuffA
CharToOemBuffA
advapi32
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetFileSecurityW
GetFileSecurityA
GetSecurityDescriptorLength
SetFileSecurityW
SetFileSecurityA
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationW
Sections
.text Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 115KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE