Static task
static1
Behavioral task
behavioral1
Sample
7f584f8570a30aa6cf4a03314ed848673304415039975906dcf9ea23cb1b4579.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7f584f8570a30aa6cf4a03314ed848673304415039975906dcf9ea23cb1b4579.exe
Resource
win10v2004-20220812-en
General
-
Target
7f584f8570a30aa6cf4a03314ed848673304415039975906dcf9ea23cb1b4579
-
Size
205KB
-
MD5
13867dbe514aeeb2a9a2e4e268c38a6d
-
SHA1
6a41d0b625639d3e0afa6f6abff74191ed48724a
-
SHA256
7f584f8570a30aa6cf4a03314ed848673304415039975906dcf9ea23cb1b4579
-
SHA512
25ae910f3efaad73f3dd539c2f7657235e02b89c087fc0098938ac48ee8e631eb680f29d9d731dc8ba3fd933137baa97e2d87af9191c58b76e2fd413b4333afa
-
SSDEEP
3072:n2/K52jd+0H5T92/PHYsqeTjJrmhk4skgi/ypV1vOrv5TZe:ed+0r2/P4sfrkskgiKtahT0
Malware Config
Signatures
Files
-
7f584f8570a30aa6cf4a03314ed848673304415039975906dcf9ea23cb1b4579.exe windows x86
ee1ebccfb2d579737eecfbf904d436af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
CreateFileW
FreeLibrary
GetDiskFreeSpaceW
LeaveCriticalSection
EnterCriticalSection
CreateThread
InterlockedIncrement
WaitForMultipleObjects
GetFullPathNameW
SetEvent
IsBadCodePtr
CreateSemaphoreW
VirtualFree
LoadLibraryW
lstrlenA
GetFileSize
GetVersionExW
GetCurrentProcess
lstrcpynW
IsBadReadPtr
WriteFile
SetFilePointer
GlobalFree
InterlockedExchange
ResetEvent
GlobalLock
SetEndOfFile
SetThreadPriority
GetProfileIntA
GetSystemDefaultLangID
GlobalAlloc
GetProcAddress
lstrcpyW
GlobalMemoryStatus
GetLastError
GetACP
CloseHandle
lstrcmpiW
ReleaseSemaphore
GetCurrentThread
GetTimeZoneInformation
MulDiv
SetUnhandledExceptionFilter
GetFileAttributesW
GlobalUnlock
InitializeCriticalSection
lstrcmpW
QueryPerformanceCounter
CreateEventW
DeleteFileW
WideCharToMultiByte
HeapAlloc
HeapFree
GetCurrentProcessId
GetQueuedCompletionStatus
ReadFile
GetSystemInfo
GetTickCount
IsBadWritePtr
GetProcessHeap
WaitForSingleObject
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetThreadPriority
GlobalHandle
MultiByteToWideChar
DeleteCriticalSection
lstrlenW
InterlockedDecrement
lstrcpyA
user32
DefWindowProcW
CheckRadioButton
GetDlgItemInt
SetWindowLongW
GetClientRect
SetDlgItemInt
GetDlgItem
GetAsyncKeyState
GetWindowRect
GetWindowLongW
DestroyWindow
PeekMessageW
DispatchMessageW
ReleaseDC
MoveWindow
TranslateMessage
LoadCursorW
CheckDlgButton
SendMessageW
IsWindowVisible
IsWindow
SetDlgItemTextW
LoadStringW
SetCursor
EnableWindow
ShowWindow
GetDC
IsRectEmpty
InvalidateRect
CreateDialogParamW
ClientToScreen
GetDesktopWindow
ncobjapi
WmiEventSourceDisconnect
WmiCommitObject
WmiEventSourceConnect
WmiCreateObjectWithProps
WmiCreateObject
WmiAddObjectProp
WmiSetAndCommitObject
WmiCreateObjectWithFormat
WmiIsObjectActive
WmiDestroyObject
ifsutil
?CheckAndRemove@NUMBER_SET@@QAEEVBIG_INT@@PAE@Z
?CheckAndAdd@SPARSE_SET@@QAEEVBIG_INT@@PAE@Z
?AddVolumeName@MOUNT_POINT_MAP@@QAEEPAVWSTRING@@0@Z
?AddEntry@AUTOREG@@SGEPBVWSTRING@@@Z
?AddNext@NUMBER_SET@@QAEEVBIG_INT@@@Z
?CheckAndAdd@NUMBER_SET@@QAEEVBIG_INT@@PAE@Z
?AddEdge@DIGRAPH@@QAEEKK@Z
?AddStart@NUMBER_SET@@QAEEVBIG_INT@@@Z
nddeapi
NDdeIsValidAppTopicListA
NDdeGetTrustedShareA
NDdeGetShareSecurityW
NDdeGetErrorStringA
NDdeGetTrustedShareW
NDdeIsValidAppTopicListW
NDdeGetShareSecurityA
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ