Static task
static1
Behavioral task
behavioral1
Sample
43569708e78349db38e8ba60564cf322b21109efe6fde4268d850f857e87cbec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43569708e78349db38e8ba60564cf322b21109efe6fde4268d850f857e87cbec.exe
Resource
win10v2004-20220812-en
General
-
Target
43569708e78349db38e8ba60564cf322b21109efe6fde4268d850f857e87cbec
-
Size
913KB
-
MD5
a26ebd2707c2addae45d7303f3707870
-
SHA1
5e92e66b69d3ca4ad58ecbac4c74d945f4fa381c
-
SHA256
43569708e78349db38e8ba60564cf322b21109efe6fde4268d850f857e87cbec
-
SHA512
39c1839debfb588b9b6e95dbcb1a2f2af827ea46669e54302bfb56db3ee60301eebb4040afdc765ed97870c584a085dd20da96e063755f9537ffe0e5f75cba60
-
SSDEEP
6144:p9JUm2y14qmQJqapPTJfk2PHnxS8VDJiNzYiAOMn:HJLmQJxJfk2fxVJuK
Malware Config
Signatures
Files
-
43569708e78349db38e8ba60564cf322b21109efe6fde4268d850f857e87cbec.exe windows x86
7085c56a5817ef299666de81dd542668
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
EnumSystemLanguageGroupsW
GetFileInformationByHandle
GetVolumeNameForVolumeMountPointW
GlobalSize
HeapDestroy
IsBadStringPtrW
LoadLibraryW
MoveFileExW
ReadFile
SetConsoleCP
TlsSetValue
WaitForSingleObjectEx
WriteConsoleOutputAttribute
lstrcpyW
VirtualAlloc
CloseHandle
GetDefaultCommConfigA
HeapCreate
ReadConsoleOutputAttribute
lstrlenW
DisableThreadLibraryCalls
EnumDateFormatsW
FindResourceW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
GetProcessHeap
GetSystemTimeAsFileTime
GetTapeStatus
GetTickCount
GetVersionExA
GetVolumePathNameA
GlobalMemoryStatus
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LoadLibraryExW
LoadResource
OpenEventW
QueryPerformanceCounter
RaiseException
SetCommConfig
SetEvent
SizeofResource
Sleep
WriteFile
_lopen
lstrcmpiW
lstrcpy
AreFileApisANSI
CreateConsoleScreenBuffer
CreateJobObjectW
DnsHostnameToComputerNameW
FreeResource
GetExitCodeProcess
MoveFileWithProgressA
SetHandleInformation
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
GetLastError
LCMapStringW
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
SetFileAttributesA
GetFileAttributesA
RtlUnwind
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
CreateDirectoryW
HeapAlloc
HeapFree
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
GetTimeFormatA
GetDateFormatA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
FindFirstFileW
FindNextFileW
HeapReAlloc
PeekNamedPipe
GetFileType
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetCurrentDirectoryA
GetFullPathNameA
GetLogicalDrives
HeapValidate
GetFileAttributesW
GetLocaleInfoA
GetCPInfo
VirtualProtect
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsGetValue
VirtualFree
GetACP
GetOEMCP
SetCurrentDirectoryA
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
IsBadWritePtr
SetStdHandle
GetStringTypeA
GetStringTypeW
CreateFileA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetTimeZoneInformation
WaitForSingleObject
CreateProcessA
InitializeCriticalSection
HeapSize
FindNextFileA
CreateFileW
WriteConsoleA
LoadLibraryA
SetFilePointer
SetEndOfFile
FlushFileBuffers
SetConsoleCtrlHandler
GetLocaleInfoW
ole32
SNB_UserFree
OleQueryCreateFromData
OleNoteObjectVisible
HMETAFILE_UserMarshal
HMETAFILEPICT_UserFree
HICON_UserMarshal
CreateDataAdviseHolder
CoRegisterMallocSpy
STGMEDIUM_UserFree
HMETAFILE_UserFree
HENHMETAFILE_UserFree
FreePropVariantArray
CoUnmarshalHresult
OleRegEnumFormatEtc
CoTestCancel
HGLOBAL_UserMarshal
CoGetCurrentLogicalThreadId
oleaut32
VarMonthName
VarDateFromI4
VarBoolFromI2
SafeArrayUnlock
VariantTimeToDosDateTime
VarUI4FromI4
VarI1FromUI2
VarBstrFromUI4
VarBoolFromCy
SafeArrayRedim
VarUI2FromStr
VarCyFromBool
rpcrt4
I_RpcReallocPipeBuffer
I_RpcBindingInqWireIdForSnego
RpcSmFree
NdrServerInitializeMarshall
NdrProxySendReceive
I_RpcServerAllocateIpPort
RpcMgmtIsServerListening
RpcServerUseProtseqA
RpcSmDisableAllocate
NdrConformantArrayMemorySize
NdrConformantArrayMarshall
MesHandleFree
I_RpcAsyncSetHandle
NdrDllGetClassObject
IUnknown_Release_Proxy
RpcServerUseProtseqIfA
RpcObjectSetType
NdrStubCall2
RpcBindingInqAuthInfoExA
shell32
SHGetFolderLocation
SHBrowseForFolderA
SHAppBarMessage
InternalExtractIconListA
DragQueryFileW
SHGetFileInfoW
ShellExecuteW
Sections
.text Size: 224KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 276KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 408KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE