Static task
static1
Behavioral task
behavioral1
Sample
ddd94b33aa5edd55f36a5a8b037c2b9084c2f67e13df853e8ba51c053f628adc.exe
Resource
win7-20220812-en
General
-
Target
ddd94b33aa5edd55f36a5a8b037c2b9084c2f67e13df853e8ba51c053f628adc
-
Size
279KB
-
MD5
07d4a26c564dd8cfa34e2a2873f7f8d0
-
SHA1
7e6740f761f95d3ff463dafab7ac71260c1b1c57
-
SHA256
ddd94b33aa5edd55f36a5a8b037c2b9084c2f67e13df853e8ba51c053f628adc
-
SHA512
8a69c581845d231dc3dce08cc61187d24246ebd7eef61b42588ffb0dafa3f5deaa0423c199ba08d98fdb05987936a900691dd1a6b26b62a09f0c0f625fe9d8d8
-
SSDEEP
3072:jSYqWD9BEj13bLv+AgctpciBo6KJjPao/iCC0lQ2C5TXyQin7D2TMdK8JwLjpkHq:9qM9OXWAgctpbAd/iCC07CBGnlXQ/X
Malware Config
Signatures
Files
-
ddd94b33aa5edd55f36a5a8b037c2b9084c2f67e13df853e8ba51c053f628adc.exe windows x86
421bf72b8d71ac5efd14bfd4a899a1b0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetModuleFileNameA
SetEvent
LoadResource
VirtualAllocEx
CreateProcessW
Process32NextW
lstrlenA
GetModuleHandleA
Sleep
MultiByteToWideChar
LockResource
CreateRemoteThread
CreateToolhelp32Snapshot
WriteProcessMemory
OpenProcess
GetModuleFileNameW
LoadLibraryA
CloseHandle
CreateFileW
ReadFile
SetFilePointer
ReleaseMutex
SetEndOfFile
SetFileAttributesW
WriteFile
GetFileSize
GetFileAttributesW
CreateMutexW
ResumeThread
ExitProcess
GetProcAddress
ReadProcessMemory
TerminateProcess
SetLastError
VirtualProtectEx
GetCurrentThreadId
VirtualFree
VirtualAlloc
FindClose
FindFirstFileW
FreeLibrary
FindResourceW
GetCurrentProcessId
WideCharToMultiByte
GetModuleHandleW
FindResourceExW
GetCurrentProcess
OpenEventW
Process32FirstW
WaitForSingleObject
SizeofResource
GetCommandLineW
GetLastError
VirtualQueryEx
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetACP
GetLocaleInfoA
GetThreadLocale
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
HeapCreate
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
user32
wsprintfW
UnregisterClassA
advapi32
SetSecurityDescriptorDacl
RegOpenKeyW
InitializeSecurityDescriptor
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyA
RegOpenKeyExW
RegSetValueExW
RegQueryValueExA
RegCloseKey
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
CommandLineToArgvW
shlwapi
PathRemoveFileSpecA
PathIsUNCW
PathRemoveFileSpecW
PathAppendW
StrStrIA
PathFindFileNameW
SHEnumKeyExW
PathFileExistsW
psapi
GetModuleFileNameExW
EnumProcesses
GetProcessImageFileNameW
Sections
.text Size: 156KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE