Static task
static1
Behavioral task
behavioral1
Sample
dca738616f6b7b071d124738842e5590e0ecc6b70847362fe2e4ea5e36307700.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dca738616f6b7b071d124738842e5590e0ecc6b70847362fe2e4ea5e36307700.exe
Resource
win10v2004-20221111-en
General
-
Target
dca738616f6b7b071d124738842e5590e0ecc6b70847362fe2e4ea5e36307700
-
Size
776KB
-
MD5
2b47269867c8af7454be22cab7c58500
-
SHA1
47b73f983b93219bfef940f308e2dfb45c0a648b
-
SHA256
dca738616f6b7b071d124738842e5590e0ecc6b70847362fe2e4ea5e36307700
-
SHA512
a92630f5125f23e3f03fc613501b4753203d6235babddbf0f782701910d20018a738fc1a1a8642a0474741df81b02a875a28ccb06e35d2e07285b62294e873ef
-
SSDEEP
24576:Ncu+gKesysDWMkB/cRxSE6gNdf3DqGGLpCYs5:Su+gb3sDWTB/cRxSElNdf3RT
Malware Config
Signatures
Files
-
dca738616f6b7b071d124738842e5590e0ecc6b70847362fe2e4ea5e36307700.exe windows x86
f4563e64274dd7d1f32f5ba9303af587
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
RpcServerRegisterIf
RpcServerUseProtseqEpA
RpcServerUnregisterIf
RpcMgmtStopServerListening
I_RpcGetBuffer
RpcRaiseException
NdrConformantStringUnmarshall
NdrConvert
NdrServerInitializeNew
NdrPointerFree
NdrPointerMarshall
NdrPointerBufferSize
RpcServerListen
kernel32
LocalFree
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
GetModuleHandleA
Sleep
CreateProcessA
GetDiskFreeSpaceA
CreateFileA
QueryPerformanceFrequency
CreateEventA
SetFilePointer
lstrcmpiA
ReadFile
FindNextFileA
lstrcmpA
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileSize
GetFileTime
CompareStringA
CompareStringW
GetVersionExA
WriteFile
LocalFileTimeToFileTime
DosDateTimeToFileTime
LoadLibraryExA
SearchPathA
FreeLibrary
WaitForSingleObject
LoadLibraryA
GetVersion
GetWindowsDirectoryA
GetTempPathA
GetTickCount
SetEvent
GetCurrentProcess
GetShortPathNameA
GetSystemDirectoryA
WinExec
SetFileTime
SetFileAttributesA
InterlockedIncrement
MoveFileExA
IsBadWritePtr
IsBadReadPtr
GetPrivateProfileSectionNamesA
WritePrivateProfileSectionA
WritePrivateProfileStringA
RemoveDirectoryA
GlobalFree
GlobalUnlock
GlobalAlloc
GetFileAttributesA
CreateThread
lstrcpynA
GetCurrentThreadId
GetCommandLineA
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrcatA
CreateFileW
GetLocaleInfoA
LockResource
LoadResource
FindResourceA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
UnhandledExceptionFilter
HeapSize
HeapReAlloc
GetOEMCP
GetACP
FormatMessageA
MultiByteToWideChar
SetLastError
GetPrivateProfileSectionA
GetModuleFileNameA
lstrcpyA
GetPrivateProfileStringA
lstrlenA
GetLastError
lstrlenW
WideCharToMultiByte
GetCurrentProcessId
OpenEventA
MoveFileA
CopyFileA
ResetEvent
CloseHandle
DeleteFileA
CreateDirectoryA
FindFirstFileA
FindClose
SetStdHandle
FlushFileBuffers
GetCPInfo
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
TlsGetValue
TlsAlloc
ExitProcess
GetStartupInfoA
HeapFree
HeapAlloc
ExitThread
TlsSetValue
RaiseException
RtlUnwind
TerminateProcess
QueryPerformanceCounter
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
VirtualProtect
VirtualQuery
GetLocalTime
GetCurrentThread
InterlockedExchange
GlobalLock
user32
SendMessageA
SetDlgItemTextA
GetDlgItem
IsDialogMessageA
DestroyWindow
PeekMessageA
MsgWaitForMultipleObjects
CreateDialogIndirectParamA
CharNextA
LoadStringA
ExitWindowsEx
GetMessageA
TranslateMessage
DispatchMessageA
PostThreadMessageA
GetDesktopWindow
CharUpperA
WaitForInputIdle
wsprintfA
MessageBoxA
CharLowerBuffA
gdi32
TranslateCharsetInfo
CreateFontIndirectA
DeleteObject
GetObjectA
advapi32
RegQueryValueA
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegQueryValueExA
RegEnumValueA
RegEnumKeyExA
RegConnectRegistryA
RegDeleteValueA
RegQueryInfoKeyA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
GetFileSecurityA
IsValidSecurityDescriptor
SetFileSecurityA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
StgCreateDocfile
StgOpenStorage
CoLoadLibrary
CreateItemMoniker
CoTaskMemFree
StringFromCLSID
CoCreateGuid
CoUninitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
ProgIDFromCLSID
WriteClassStm
OleSaveToStream
OleLoadFromStream
CreateStreamOnHGlobal
CoRegisterClassObject
CoRevokeClassObject
CLSIDFromString
CreateFileMoniker
CoReleaseMarshalData
CoMarshalInterface
CoUnmarshalInterface
GetRunningObjectTable
CoInitialize
oleaut32
GetErrorInfo
SysFreeString
SysAllocString
VariantClear
SysAllocStringLen
SysStringLen
VariantChangeType
SysReAllocStringLen
LoadRegTypeLi
VariantInit
VariantCopy
SafeArrayPutElement
SafeArrayDestroy
SafeArrayGetElement
SafeArrayCreate
RegisterTypeLi
LoadTypeLi
SafeArrayCopy
SysStringByteLen
SysAllocStringByteLen
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
VariantCopyInd
SetErrorInfo
CreateErrorInfo
msi
ord160
ord49
ord79
ord103
ord117
ord124
ord31
ord159
ord146
ord8
ord116
ord73
ord112
ord87
ord189
ord18
ord46
ord33
ord136
ord144
ord141
ord168
ord7
ord67
ord93
ord91
ord95
ord120
ord75
ord17
comctl32
ord17
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 496KB - Virtual size: 493KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE