Static task
static1
Behavioral task
behavioral1
Sample
b7fc3a8e02f4da397233b850925141522ec6043ff752691f4a22961b3adcdc78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7fc3a8e02f4da397233b850925141522ec6043ff752691f4a22961b3adcdc78.exe
Resource
win10v2004-20220812-en
General
-
Target
b7fc3a8e02f4da397233b850925141522ec6043ff752691f4a22961b3adcdc78
-
Size
106KB
-
MD5
2ce0a18802b4a3caa3e47b9ce8f61730
-
SHA1
22f93d90715504929e066a254bf08023fd7aa85b
-
SHA256
b7fc3a8e02f4da397233b850925141522ec6043ff752691f4a22961b3adcdc78
-
SHA512
af32d083be4e53b05b94a4fffbedae916337e09f405daecef2c1ed8c1d6a47f7342b0849efd3a333cdb42a2719c75f1f27ccbc7965512e067bb6841fb49ea73f
-
SSDEEP
3072:nIakjsLP7sna4jz+WvhyL11kiuinZ8tgWlMs:nIa4ETsVzBvhM1/OtvM
Malware Config
Signatures
Files
-
b7fc3a8e02f4da397233b850925141522ec6043ff752691f4a22961b3adcdc78.exe windows x86
46eadabb113b23802a8a5a26c113324a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegConnectRegistryW
CheckTokenMembership
AllocateAndInitializeSid
FreeSid
kernel32
CloseHandle
GetFileSize
CreateFileW
WritePrivateProfileStringW
SetFileAttributesW
GetFileAttributesW
GetLastError
WritePrivateProfileSectionW
HeapSetInformation
GetTimeFormatW
GetComputerNameExW
GetModuleFileNameW
FileTimeToSystemTime
SetConsoleMode
ReadFile
ReadConsoleW
WriteConsoleW
ExitProcess
GetConsoleOutputCP
HeapReAlloc
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
CompareStringA
GetThreadLocale
CompareStringW
GetPrivateProfileSectionW
lstrlenA
GetFileType
GetStdHandle
GetConsoleMode
VerSetConditionMask
VerifyVersionInfoW
FormatMessageW
LocalFree
SetThreadUILanguage
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetLastError
GetPrivateProfileStringW
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
lstrlenW
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
wcschr
_ltow
wcsstr
_itow
wcsrchr
_wfopen
fclose
_wchmod
wcsncpy_s
memset
wcstok
__iob_func
_vsnwprintf
_memicmp
_get_osfhandle
_errno
_fileno
fflush
fprintf
wcstod
wcstoul
wcstol
user32
CharUpperW
CharLowerW
LoadStringW
mpr
WNetCancelConnection2W
WNetGetLastErrorW
WNetAddConnection2W
netapi32
NetApiBufferFree
NetServerGetInfo
ws2_32
FreeAddrInfoW
WSACleanup
GetAddrInfoW
WSAStartup
WSAGetLastError
GetNameInfoW
secur32
GetUserNameExW
shlwapi
StrStrIW
StrCmpNW
StrRChrW
StrChrW
StrChrIW
StrStrW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zuvutsu Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE