Static task
static1
Behavioral task
behavioral1
Sample
7f7b7f4df46b675997d09fb314370fecbdfc998eaeb2ce73045ec8908201c349.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f7b7f4df46b675997d09fb314370fecbdfc998eaeb2ce73045ec8908201c349.exe
Resource
win10v2004-20220812-en
General
-
Target
7f7b7f4df46b675997d09fb314370fecbdfc998eaeb2ce73045ec8908201c349
-
Size
410KB
-
MD5
c3518b5f816a0c99da4cd378f4705b17
-
SHA1
c789d4882f8545ad8de79b43447a9591a31738b5
-
SHA256
7f7b7f4df46b675997d09fb314370fecbdfc998eaeb2ce73045ec8908201c349
-
SHA512
3b44fbf0733c30bc839fb813cbe57d10928a56b090962b43737eec82ae45e144e955ed1db73a835dfe4307a39437d9e7752c6b87b0937485eb1aaaa75be9a56e
-
SSDEEP
6144:ljnzzIG4rbQJedpyDyZwWytlcG1LXXzrhy66G49X:NzzItPQjyZRslcG5rhy6
Malware Config
Signatures
Files
-
7f7b7f4df46b675997d09fb314370fecbdfc998eaeb2ce73045ec8908201c349.exe windows x86
d1103abf831ebfcfa593b2cec7926554
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteProcThreadAttributeList
GetProcAddress
GetModuleHandleW
CreateProcessA
SizeofResource
HeapFree
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
HeapSize
GetLastError
LockResource
UpdateProcThreadAttribute
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
CreateFileW
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
OpenProcess
ResumeThread
InitializeProcThreadAttributeList
GetModuleFileNameW
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcessId
CreateProcessW
CreateThread
CloseHandle
Sleep
HeapReAlloc
VirtualAlloc
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapQueryInformation
WriteConsoleW
GetFileSizeEx
GetConsoleOutputCP
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
WaitForSingleObject
DeleteFileW
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
LCMapStringW
CompareStringW
SetEndOfFile
GetFullPathNameW
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RaiseException
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ReadFile
DuplicateHandle
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleExW
ExitProcess
HeapValidate
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetDriveTypeW
user32
ReleaseDC
GetDC
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
BitBlt
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupAccountSidW
LookupPrivilegeValueW
shell32
ord680
ws2_32
recv
htons
closesocket
connect
socket
send
WSAConnect
WSAStartup
inet_ntoa
inet_addr
inet_pton
WSASocketW
wtsapi32
WTSEnumerateProcessesExW
WTSFreeMemoryExW
shlwapi
PathFindExtensionW
gdiplus
GdipSaveImageToFile
GdipCreateBitmapFromScan0
GdipGetImageEncodersSize
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
GdiplusStartup
GdipGetImageEncoders
Sections
.text Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ