Static task
static1
Behavioral task
behavioral1
Sample
7c198d0e7f0524a251185b4adaeb7936e8052d3a942134711880b739bf76ac0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c198d0e7f0524a251185b4adaeb7936e8052d3a942134711880b739bf76ac0e.exe
Resource
win10v2004-20220901-en
General
-
Target
7c198d0e7f0524a251185b4adaeb7936e8052d3a942134711880b739bf76ac0e
-
Size
776KB
-
MD5
077f41dc951033d778fdf2e4b4f81e9b
-
SHA1
aa4da27a1a08c9da782c92e54b8922fdff7f7e2b
-
SHA256
7c198d0e7f0524a251185b4adaeb7936e8052d3a942134711880b739bf76ac0e
-
SHA512
62727f60aba44960823f67279b1b61f7e269046e0243ee1e88376f25aeb4d0b6b32e719bd8d8b07d2cad37da84e0da109542ef351669db8ed2f0be11fe9c02f9
-
SSDEEP
12288:a3pJvXg5LonTFmr5BA4wS2lTQTttGxQqhWSOJUf3zhMzdLYMtPVv:KLvwPe4vScTtaQJEvzhMznt
Malware Config
Signatures
Files
-
7c198d0e7f0524a251185b4adaeb7936e8052d3a942134711880b739bf76ac0e.exe windows x86
92a6d514c6aaecc9253dd056a0d4bd7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
icmp
IcmpSendEcho
IcmpCreateFile
IcmpCloseHandle
dbghelp
MiniDumpReadDumpStream
MiniDumpWriteDump
kernel32
CloseHandle
UnmapViewOfFile
MapViewOfFile
GetLastError
CreateFileMappingA
CreateFileA
GetCurrentProcess
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
FindClose
CreateDirectoryA
FindFirstFileA
FindNextFileA
DeleteFileA
ReadFile
GetFileInformationByHandle
SetFilePointer
WriteFile
GetLocalTime
GetFullPathNameA
WaitForSingleObjectEx
SetEvent
GetFileAttributesA
WaitForMultipleObjects
SetUnhandledExceptionFilter
CreateEventA
OpenProcess
GetExitCodeProcess
WaitForSingleObject
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
InitializeCriticalSection
DeleteCriticalSection
RaiseException
InterlockedIncrement
InterlockedDecrement
GetSystemInfo
InterlockedCompareExchange
WideCharToMultiByte
MultiByteToWideChar
TerminateThread
ResumeThread
InterlockedExchangeAdd
DuplicateHandle
SetEndOfFile
GetTimeZoneInformation
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetModuleFileNameA
SetCurrentDirectoryA
Sleep
GetLocaleInfoW
CompareStringA
CompareStringW
ResetEvent
LoadLibraryA
GetOEMCP
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetCPInfo
SetConsoleCtrlHandler
FlushFileBuffers
SetEnvironmentVariableA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
UnhandledExceptionFilter
FatalAppExitA
HeapSize
GetSystemTimeAsFileTime
QueryPerformanceCounter
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
GetProcAddress
GetModuleHandleA
TerminateProcess
ExitThread
CreateThread
HeapAlloc
HeapFree
GetStartupInfoA
GetCommandLineA
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
LCMapStringA
LCMapStringW
TlsAlloc
SetLastError
user32
PostMessageA
wsprintfA
MessageBoxA
UnregisterClassA
advapi32
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegCloseKey
shell32
SHGetSpecialFolderPathA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
ws2_32
WSACloseEvent
accept
WSASetEvent
ntohs
getpeername
getsockname
closesocket
recv
WSACreateEvent
bind
listen
WSAEventSelect
inet_addr
gethostbyname
WSAGetLastError
htons
recvfrom
send
sendto
shutdown
WSAEnumNetworkEvents
WSAResetEvent
WSAWaitForMultipleEvents
WSACleanup
WSAStartup
connect
WSASocketA
Sections
.text Size: 420KB - Virtual size: 419KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 514KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 22B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE