Static task
static1
Behavioral task
behavioral1
Sample
21ed53fcc5fa74efe55c46bfb9254084a7797ff3f5ddc0b5cebc317133405fea.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
21ed53fcc5fa74efe55c46bfb9254084a7797ff3f5ddc0b5cebc317133405fea.exe
Resource
win10v2004-20220901-en
General
-
Target
21ed53fcc5fa74efe55c46bfb9254084a7797ff3f5ddc0b5cebc317133405fea
-
Size
224KB
-
MD5
0c8139f14470af89e4b3780c0ec4f6b0
-
SHA1
f478fd0e4438aa8c5b40e25134d99365fc21fcc2
-
SHA256
21ed53fcc5fa74efe55c46bfb9254084a7797ff3f5ddc0b5cebc317133405fea
-
SHA512
65526f6a1572b93b65a03cc1dcec7c59a4231975961485ccfab1e3ed270707eb6f7afaca11e845a75117489da20fbfd92d6a2d748f559716b7fc332ecd3d0c3b
-
SSDEEP
6144:dMQrm9WQFKATAIUbBRIc+v+GDx2DQudUapZN171qnfV6:dMQr+WQfTAIYRRG+Gd21bU
Malware Config
Signatures
Files
-
21ed53fcc5fa74efe55c46bfb9254084a7797ff3f5ddc0b5cebc317133405fea.exe windows x86
43b1de0e43e22d83017837ab9fe4bb5e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysFreeString
SysAllocStringByteLen
VariantClear
VariantCopy
SysStringByteLen
SysAllocString
user32
CharUpperA
CharUpperW
CharNextA
advapi32
GetFileSecurityW
SetFileSecurityW
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExW
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
memset
fputc
fflush
fgetc
fclose
_iob
free
malloc
memcmp
fputs
memmove
_purecall
memcpy
wcslen
wcscpy
strlen
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetProcessTimes
VirtualAlloc
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
GetFileInformationByHandle
FreeLibrary
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
CreateFileA
GetModuleHandleA
GetProcAddress
FindNextFileA
FindNextFileW
FindFirstFileA
FindFirstFileW
FindClose
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
GetTempPathA
GetTempPathW
GetCurrentDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryA
SetCurrentDirectoryW
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
SetConsoleMode
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetLastError
GetFullPathNameA
LoadLibraryExW
LoadLibraryExA
LoadLibraryW
LoadLibraryA
GetModuleFileNameW
GetModuleFileNameA
LocalFree
FormatMessageW
FormatMessageA
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesW
SetFileAttributesA
RemoveDirectoryW
RemoveDirectoryA
MoveFileW
MoveFileA
CreateDirectoryW
CreateDirectoryA
DeleteFileW
DeleteFileA
GetFullPathNameW
OpenEventA
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ucvrmcj Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE