Static task
static1
Behavioral task
behavioral1
Sample
f4f45e2178316a5cbd21dcdb5d8b1fc9c950e7af2da55d97f857507634b4f110.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f4f45e2178316a5cbd21dcdb5d8b1fc9c950e7af2da55d97f857507634b4f110.exe
Resource
win10v2004-20220901-en
General
-
Target
f4f45e2178316a5cbd21dcdb5d8b1fc9c950e7af2da55d97f857507634b4f110
-
Size
1.4MB
-
MD5
c07aa31bded61110dd01c6d4a852aca9
-
SHA1
76b914ffde89509c0d71c6a4545727a89e0497f5
-
SHA256
f4f45e2178316a5cbd21dcdb5d8b1fc9c950e7af2da55d97f857507634b4f110
-
SHA512
e6e70b4a4ab8f66c6065a185c9a1fd5047a58d45e6e8078e83514cb605dc95238cc2319f9a7e9aa6b6763c2da286f9d6f2ef753b8b95086ef1f7fd18cb123f69
-
SSDEEP
24576:8Rwqx60lDtQKTTLtjGK3X7yZ+t5ROh41mFcOENq5FBtlLYSz8OU:8Rbhv9GKneonKcOEstBvz8H
Malware Config
Signatures
Files
-
f4f45e2178316a5cbd21dcdb5d8b1fc9c950e7af2da55d97f857507634b4f110.exe windows x86
cd5e0d26dab5b023718f367f274828a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetEnvironmentVariableW
OpenMutexA
GetDriveTypeW
EnumCalendarInfoExA
GetDriveTypeA
PrepareTape
IsDBCSLeadByteEx
GetFullPathNameW
GetVolumeInformationA
SetPriorityClass
LCMapStringW
GetCompressedFileSizeA
ExpandEnvironmentStringsW
GetLogicalDriveStringsA
GetStdHandle
EnumCalendarInfoExW
GetFileSize
DnsHostnameToComputerNameA
FlushInstructionCache
GetProcAddress
CreateFileMappingW
GetConsoleCursorInfo
ResetWriteWatch
FindFirstFileA
PeekNamedPipe
CreateWaitableTimerW
GetProfileSectionA
ReplaceFileA
MoveFileWithProgressW
OpenSemaphoreA
SetConsoleActiveScreenBuffer
GetPrivateProfileIntA
ProcessIdToSessionId
MoveFileWithProgressA
GetCurrencyFormatW
GetConsoleOutputCP
FindFirstVolumeMountPointA
GetConsoleAliasesW
SearchPathA
GetThreadContext
GetFileAttributesExA
FindResourceW
GetUserDefaultLangID
VirtualAlloc
CreateSemaphoreA
GetStringTypeExW
SetProcessAffinityMask
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
LCMapStringA
GetLocaleInfoA
HeapSize
RtlUnwind
HeapReAlloc
HeapAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
LoadLibraryA
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCommandLineA
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
rpcrt4
NdrDcomAsyncClientCall
RpcMgmtSetComTimeout
RpcBindingFromStringBindingW
NdrPointerMarshall
RpcEpRegisterW
UuidCompare
RpcErrorResetEnumeration
RpcNetworkIsProtseqValidW
NdrConvert2
RpcSmDestroyClientContext
RpcObjectSetType
RpcServerUseAllProtseqsIf
RpcServerUnregisterIfEx
RpcUserFree
RpcBindingServerFromClient
RpcStringBindingParseW
RpcBindingInqAuthClientExA
UuidIsNil
NdrUserMarshalMarshall
I_RpcBindingInqTransportType
MesHandleFree
RpcBindingInqObject
RpcServerUseProtseqA
RpcBindingInqAuthClientExW
RpcMgmtInqStats
NdrServerCall2
RpcServerUseProtseqEpW
RpcErrorEndEnumeration
RpcMgmtWaitServerListen
NdrMesTypeAlignSize2
NdrInterfacePointerBufferSize
RpcSsContextLockExclusive
NdrFullPointerXlatInit
RpcBindingToStringBindingA
user32
EnableScrollBar
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512KB - Virtual size: 825KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t7rv Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 625KB - Virtual size: 625KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ