Static task
static1
Behavioral task
behavioral1
Sample
f8b9e034a48f3b53d3afaec490fcea5e7d546c1a1b42dd54a5bd4f0b8d67ac33.exe
Resource
win7-20220812-en
General
-
Target
f8b9e034a48f3b53d3afaec490fcea5e7d546c1a1b42dd54a5bd4f0b8d67ac33
-
Size
224KB
-
MD5
01bd9b02e5ef860153e00b6fe47e63f0
-
SHA1
385ae714d357f6494b82fb5fa6336e31ac71a5fe
-
SHA256
f8b9e034a48f3b53d3afaec490fcea5e7d546c1a1b42dd54a5bd4f0b8d67ac33
-
SHA512
71fe3a078dfc4bca6c7539e617409377540e5203d9c85c0a3999e9c1026d5eb905ff0cd46abd79081f067d472ae334e1ffd7d24b87d6bc20bcf8f5c52934cc8d
-
SSDEEP
6144:ucfVAwfLGiPXhoJt2tNRo1BW2HdV/vnP9erf:uoLytGNREW29VH
Malware Config
Signatures
Files
-
f8b9e034a48f3b53d3afaec490fcea5e7d546c1a1b42dd54a5bd4f0b8d67ac33.exe windows x86
cf40fab5a2f65e08d364b7e6834e4a15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetDriveTypeW
GetDriveTypeA
GetFileSize
WaitForSingleObject
DeleteFileW
DeviceIoControl
IsBadWritePtr
ResetEvent
CreateEventA
QueryDosDeviceA
SetEndOfFile
CreateDirectoryA
GetTempFileNameA
CreateDirectoryW
GetTempFileNameW
CreateFileA
CreateFileW
WriteFile
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
lstrcatA
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleHandleA
GetStartupInfoA
GetShortPathNameA
MultiByteToWideChar
lstrlenA
InterlockedIncrement
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
GetCommandLineA
lstrcmpiA
GetCurrentThreadId
GetCurrentThread
InterlockedDecrement
CloseHandle
CreateMutexA
ReadFile
SetFilePointer
WideCharToMultiByte
GetLastError
user32
CharNextA
GetMessageA
wsprintfA
DispatchMessageA
PostThreadMessageA
MessageBoxA
LoadStringA
msvcrt
__set_app_type
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
_stati64
_wstati64
wcslen
_splitpath
_makepath
_wmakepath
_wsplitpath
swprintf
wcschr
wcscpy
wcscat
malloc
free
vsprintf
puts
fopen
vfprintf
fclose
__CxxFrameHandler
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
strncpy
strncmp
strtok
toupper
_wcslwr
_wcsicmp
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
RegEnumKeyExW
RegEnumKeyExA
RegQueryValueExW
RegSetValueExW
RegSetValueExA
RegCreateKeyExW
RegCreateKeyExA
RegDeleteKeyW
RegDeleteKeyA
RegDeleteValueA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenThreadToken
CreateServiceA
DeleteService
ControlService
StartServiceCtrlDispatcherA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CopySid
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
OpenProcessToken
RegOpenKeyExA
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ole32
CoInitializeSecurity
CoDisconnectObject
CoRegisterClassObject
CoRevokeClassObject
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
LoadRegTypeLi
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
SysStringLen
shlwapi
PathFileExistsA
PathFileExistsW
winmm
timeGetTime
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE