Static task
static1
Behavioral task
behavioral1
Sample
d7b9001653ff9f9f3ac782dc1f38d14e88dbee0a2775f1e18a8a6e79a51806c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7b9001653ff9f9f3ac782dc1f38d14e88dbee0a2775f1e18a8a6e79a51806c8.exe
Resource
win10v2004-20220901-en
General
-
Target
d7b9001653ff9f9f3ac782dc1f38d14e88dbee0a2775f1e18a8a6e79a51806c8
-
Size
452KB
-
MD5
230118097a7ca74a297675db048269a0
-
SHA1
f0bce30c70758c9079a1c0c44bfb0e49d753d528
-
SHA256
d7b9001653ff9f9f3ac782dc1f38d14e88dbee0a2775f1e18a8a6e79a51806c8
-
SHA512
420defc97e94351924dedea5d43eabcadb5cc05d1df84faf4e65eaedbb97c9095c9f69df71c97b1c8d3b555df2a29d81f7321833d37b796f59a07f079d8fbd9e
-
SSDEEP
6144:qPv8htwHgk4H+mIf+QrVYjD8+8bm9QmBEei8NYK0hWTdNPRr+a1K:qbgkYpIflVSD8vm9Qm3aRcvPp
Malware Config
Signatures
Files
-
d7b9001653ff9f9f3ac782dc1f38d14e88dbee0a2775f1e18a8a6e79a51806c8.exe windows x86
ae2362fedb71df7bbcbe3e7eff522866
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
lstrcpyA
GetLastError
CreateMutexA
MoveFileA
RemoveDirectoryA
DeleteFileA
CreateDirectoryA
lstrlenA
GetCommandLineA
GetModuleFileNameA
Sleep
GetLocalTime
GetTickCount
CompareStringW
CompareStringA
ExpandEnvironmentStringsA
GetFileAttributesExA
CreateThread
WaitForSingleObject
TerminateThread
CloseHandle
GetTempPathA
WriteFile
VirtualQuery
GetLocaleInfoW
GetTimeZoneInformation
ReadFile
GetProcessHeap
SetEndOfFile
LoadLibraryA
FreeLibrary
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
CreateFileA
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetFilePointer
InitializeCriticalSectionAndSpinCount
VirtualAlloc
HeapReAlloc
HeapSize
HeapAlloc
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetStartupInfoA
HeapValidate
IsBadReadPtr
FatalAppExitA
GetProcAddress
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetCurrentThread
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
MultiByteToWideChar
LCMapStringA
LCMapStringW
DebugBreak
GetStdHandle
OutputDebugStringA
WriteConsoleW
GetFileType
OutputDebugStringW
ExitProcess
SetConsoleCtrlHandler
LoadLibraryW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
VirtualFree
SetEnvironmentVariableA
user32
wsprintfA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyA
ole32
CoInitialize
GetClassFile
shell32
ShellExecuteA
oleaut32
SysFreeString
shlwapi
PathGetArgsA
PathFileExistsA
PathIsDirectoryA
PathRemoveBlanksA
PathFindFileNameA
ws2_32
closesocket
__WSAFDIsSet
select
send
ioctlsocket
htons
socket
gethostbyname
connect
recv
WSAStartup
netapi32
Netbios
Sections
.text Size: 420KB - Virtual size: 420KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.r Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE