Static task
static1
Behavioral task
behavioral1
Sample
7346c6c08764e0cb2d7edc50164e266853f8f7638db23d75ce5ac40f8e66abd2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7346c6c08764e0cb2d7edc50164e266853f8f7638db23d75ce5ac40f8e66abd2.exe
Resource
win10v2004-20220812-en
General
-
Target
7346c6c08764e0cb2d7edc50164e266853f8f7638db23d75ce5ac40f8e66abd2
-
Size
72KB
-
MD5
23f10ec52ae05e3d9c5870e64ce4e2f0
-
SHA1
190234f9b5dc32397f69e997ce56b7419b1bdf11
-
SHA256
7346c6c08764e0cb2d7edc50164e266853f8f7638db23d75ce5ac40f8e66abd2
-
SHA512
a60ab7881be853b8ea0843e6386c7f880eb7ddd302ed78d03706fe0555012a1a5d85fc9d504b8883f38d2501937f290a9ec9ba8985ddcc9c8bd2bf64f0145f93
-
SSDEEP
1536:MyAXivhJyLHSXuyTBN2HZ6zpc5mY2K3i80yUjHHBxwX:LDJSyeyT6HkOHA80jTHBx
Malware Config
Signatures
Files
-
7346c6c08764e0cb2d7edc50164e266853f8f7638db23d75ce5ac40f8e66abd2.exe windows x86
b1f584304d1c7f2899a954905d8318c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
kernel32
SetThreadUILanguage
GetCPInfo
GetConsoleOutputCP
GetLastError
HeapSetInformation
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessW
GetSystemDirectoryW
GetDriveTypeW
DelayLoadFailureHook
GetProcAddress
FreeLibrary
InterlockedCompareExchange
GetStdHandle
WriteFile
FormatMessageW
LocalFree
SetLastError
GetModuleFileNameW
PeekConsoleInputW
GetConsoleMode
SetConsoleMode
ReadConsoleW
GetFileType
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
Sleep
InterlockedExchange
GetCommandLineW
LoadLibraryExA
WriteConsoleW
LoadLibraryW
GetConsoleScreenBufferInfo
LocalAlloc
WideCharToMultiByte
msvcrt
_vsnwprintf_s
free
putchar
__setusermatherr
_amsg_exit
_initterm
__p__commode
_snwprintf_s
_local_unwind4
wcstok
_wcsdup
wcsncat_s
calloc
wcscspn
wcsspn
__set_app_type
__p__fmode
_except_handler4_common
?terminate@@YAXXZ
memmove
_XcptFilter
_exit
_cexit
__getmainargs
wcsrchr
wcsncpy_s
wcsncmp
qsort
_ultow
wcspbrk
iswctype
_wcsupr
_wcsicmp
wcschr
wcscpy_s
wcscat_s
exit
sprintf_s
setlocale
_wcsnicmp
memset
_iob
_fileno
_setmode
_controlfp
malloc
netutils
NetpwNameValidate
NetApiBufferReallocate
NetApiBufferAllocate
NetapipBufferAllocate
NetpwPathType
NetApiBufferFree
browcli
NetServerEnum
samcli
NetUserGetInfo
srvcli
NetShareEnum
NetServerGetInfo
wkscli
NetUseGetInfo
NetWkstaUserGetInfo
NetWkstaGetInfo
NetUseEnum
mpr
WNetEnumResourceW
WNetAddConnection2W
WNetCancelConnection2W
WNetGetLastErrorW
WNetGetConnectionW
WNetOpenEnumW
WNetCloseEnum
iphlpapi
GetCurrentThreadCompartmentId
ntdll
RtlAllocateHeap
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE