Static task
static1
Behavioral task
behavioral1
Sample
33753461c2768ffd24b69fb59ca1e04422d0831c402fb10ce16aa46a07849c51.exe
Resource
win7-20220812-en
General
-
Target
33753461c2768ffd24b69fb59ca1e04422d0831c402fb10ce16aa46a07849c51
-
Size
350KB
-
MD5
53211bd4f415c41d932151ebabb81790
-
SHA1
6054a5b6dfdf3cec38ac3b488f3742d6df80b7bd
-
SHA256
33753461c2768ffd24b69fb59ca1e04422d0831c402fb10ce16aa46a07849c51
-
SHA512
33b48e8c406a33834bfecd59b2f7e455c6cdef11bd2358f49e2789f2e2eda3663a9ae1f039bfa55b87218576af37aab8bc34ae5f3510240665a3029e81e1205f
-
SSDEEP
6144:RFd0cjpmKSymNGLkKe3mAorFaeJCBNErH2RKhqwePJZ71qevyKv:XUKSymHFZe7OaIKhqw2JtTvyKv
Malware Config
Signatures
Files
-
33753461c2768ffd24b69fb59ca1e04422d0831c402fb10ce16aa46a07849c51.exe windows x86
f8f2df8e9178afe34596fd302dd73530
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
SetFileTime
MoveFileW
FlushFileBuffers
SetFilePointer
SetEndOfFile
GetFileType
CreateFileA
CreateFileW
ReadFile
SetLastError
WriteFile
GetDriveTypeA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleW
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
MoveFileA
DeleteFileA
DeleteFileW
DeviceIoControl
CreateDirectoryA
CreateDirectoryW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
FindClose
FindNextFileA
FindFirstFileA
FindNextFileW
FindFirstFileW
CloseHandle
GetFullPathNameA
GetModuleFileNameA
GetModuleFileNameW
SetErrorMode
FreeLibrary
LoadLibraryW
LoadLibraryExW
CompareStringA
SetThreadPriority
GetCurrentThread
SetPriorityClass
LocalFileTimeToFileTime
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
GetCPInfo
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetEnvironmentVariableA
GetLocaleInfoA
FormatMessageW
LocalFree
SetConsoleCtrlHandler
Sleep
GetLastError
GetCurrentDirectoryW
GetStdHandle
GetConsoleMode
SetConsoleMode
GetVersionExW
ReadConsoleW
GetStringTypeW
GetStringTypeA
GetConsoleCP
GetSystemTimeAsFileTime
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleA
ExitProcess
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
RaiseException
HeapSize
LoadLibraryA
GetVersion
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
CharLowerW
ExitWindowsEx
CharUpperA
CharLowerA
LoadStringW
CharUpperW
CharToOemBuffW
OemToCharBuffW
CharToOemA
OemToCharA
OemToCharBuffA
advapi32
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetFileSecurityW
SetFileSecurityA
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.text Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 106KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE