??4_Init_locks@std@@QAEAAV01@ABV01@@Z
Static task
static1
Behavioral task
behavioral1
Sample
3ec5ec23b3195d3608d6490af383e199fd5c21c43c9dac269ca42c51b11e0590.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ec5ec23b3195d3608d6490af383e199fd5c21c43c9dac269ca42c51b11e0590.exe
Resource
win10v2004-20220812-en
General
-
Target
3ec5ec23b3195d3608d6490af383e199fd5c21c43c9dac269ca42c51b11e0590
-
Size
341KB
-
MD5
66e99b3f60c90dcb7fcbb5786655c54a
-
SHA1
44bb6db0bf5c60c0454de19e763de470aa8828d8
-
SHA256
3ec5ec23b3195d3608d6490af383e199fd5c21c43c9dac269ca42c51b11e0590
-
SHA512
311ad680d5676a65a1c78eb523d58bbcd935d6dad0eefa4523b807c302c54627392611f4d18d27c83d88149fdb0050b6adba65686c0b18212981e2df0531d16c
-
SSDEEP
6144:Q5EP+wENg/xnNBZIrhYuqC7OV3A/vIhxfc5JUz0pkOb/XG:/P+wENgtNBCnq5A/mfyKz0p
Malware Config
Signatures
Files
-
3ec5ec23b3195d3608d6490af383e199fd5c21c43c9dac269ca42c51b11e0590.exe windows x86
ad2f55b9a4e43ae782c0b898ceda9029
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryW
GetLastError
GetModuleFileNameW
GetSystemPowerStatus
GetSystemTimeAsFileTime
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
InterlockedExchange
GetTickCount
GetDiskFreeSpaceExW
DeviceIoControl
QueryDosDeviceW
GetLogicalDrives
GetCurrentProcessId
GetCurrentThreadId
WaitForMultipleObjects
CreateEventW
SetUnhandledExceptionFilter
CreateProcessW
GetVolumeInformationW
FindFirstVolumeW
CloseHandle
CreateFileW
FindNextVolumeW
GetDriveTypeW
FindVolumeClose
SetLastError
advapi32
RegisterServiceCtrlHandlerExW
SetServiceStatus
CloseServiceHandle
OpenSCManagerW
OpenServiceW
ChangeServiceConfig2W
StartServiceCtrlDispatcherW
avgsysx
?AvgCopyString@@YGHPA_WIPB_WI@Z
??1AvgBasCriticalSectionHolder@@QAE@XZ
??0AvgBasCriticalSectionHolder@@QAE@PAVAvgBasCriticalSection@@@Z
?Destroy@AvgBasCriticalSection@@QAGHXZ
?Create@AvgBasCriticalSection@@QAGHXZ
??1AvgBasCriticalSection@@QAE@XZ
??0AvgBasCriticalSection@@QAE@XZ
?Assign@AvgGuidUtils@@YGXAAU_AvgGuid@@QBE@Z
?IsWow64Process@AvgProcess@@YGHKAA_N@Z
?IsWindowsVista@OsInfo@AvgEnvironment@@YG_NXZ
?Append@AvgUtf16CharHeapBuffer@@QAGH_W@Z
??AAvgUtf16CharHeapBuffer@@QAGAA_WI@Z
?IsEmpty@AvgUtf16CharHeapBuffer@@QBG_NXZ
?GetString@AvgGuidUtils@@YGHABU_AvgGuid@@AAU_AVG_UTF16CHAR_STR@@@Z
?AvgKernel32ForceInitialize@@YGXXZ
?GetCurrentModuleHandle@AvgProcess@@YGPAXXZ
?AvgKernel32_UnhandledExceptionFilter@@YGJPAU_EXCEPTION_POINTERS@@@Z
?AvgWinIsProcessBeingDebugged@@YG_NXZ
?AvgKernel32_SetUnhandledExceptionFilter@@YGP6GJPAU_EXCEPTION_POINTERS@@@ZP6GJ0@Z@Z
?AvgKernel32IsFnLoaded_UnhandledExceptionFilter@@YG_NXZ
?AvgGetUtf162TStringSize@@YGHAAIPB_WI@Z
?Assign@AvgUtf16CharHeapBuffer@@QAGH_W@Z
?Append@AvgUtf16CharHeapBuffer@@QAGHPB_WI@Z
?Erase@AvgUtf16CharHeapBuffer@@QAGHII@Z
?AvgConvertUtf162TString@@YGHAAU_AVG_UTF16CHAR_STR@@PB_WIPAI@Z
?AvgGetNtdllModuleHandle@@YGPAXXZ
?Assign@AvgUtf16CharHeapBuffer@@QAGHPB_WI@Z
?Swap@AvgUtf16CharHeapBuffer@@QAGXAAV1@@Z
?AvgToLower@@YG_W_W@Z
?AvgNtdll_ZwCreateMutant@@YGJPAPAXKPAU_OBJECT_ATTRIBUTES@@E@Z
?AvgGetStringSizeInElements@@YGIPB_W@Z
?AvgCreateErrorCodeFromWin32@@YGHK@Z
?AvgFindSubStringFromRight@@YGPB_WPB_W0II@Z
?DirectoryExists@AvgBasFs@@YGHPB_W@Z
?AvgFormatStringV@@YGHW4AvgCodePage@@PA_WIPB_WPAIPAD@Z
?AvgCompareString@@YGHPB_W0II@Z
?AvgPrintV@@YGHPB_WPAD@Z
?AttachTo@AvgBasSharedLibraryLoader@@QAGHPBDPCRAX@Z
?Unload@AvgBasSharedLibraryLoader@@UAGXXZ
?Load@AvgBasSharedLibraryLoader@@QAGHPB_W@Z
??1AvgBasSharedLibraryLoader@@UAE@XZ
??0AvgBasSharedLibraryLoader@@QAE@PB_W@Z
?IsWindowsVistaOrHigher@OsInfo@AvgEnvironment@@YG_NXZ
?GetMaxPathLength@AvgEnvironment@@YGHAAIPB_W@Z
?GetFullPath@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PB_WIPAI@Z
?GetModuleDirectory@AvgModule@@YGHPAXAAU_AVG_UTF16CHAR_STR@@PAI@Z
?GetEnvironmentVar@AvgEnvironment@@YGHPB_WAAU_AVG_UTF16CHAR_STR@@PAI@Z
?GetCurrentProcessId@AvgProcess@@YGKXZ
??0AvgUtf16CharHeapBuffer@@QAE@XZ
??1AvgUtf16CharHeapBuffer@@QAE@XZ
?ReserveElements@AvgUtf16CharHeapBuffer@@QAGHI@Z
?GetSize@AvgUtf16CharHeapBuffer@@QBGIXZ
?GetValue@AvgUtf16CharHeapBuffer@@QBGPB_WXZ
?GetInternal@AvgUtf16CharHeapBuffer@@QAGAAU_AVG_UTF16CHAR_STR@@XZ
?AvgInitializeSysMini@@YGHXZ
?AvgDestroySysMini@@YGXXZ
??0AvgSpinLockLocker@@QAE@PAUAvgSpinLock@@_N@Z
??1AvgSpinLockLocker@@QAE@XZ
?AvgConvertString2Number@@YGHAAHPB_WIHPAPB_W@Z
?AvgCompareStringNoCase@@YGHW4AvgCodePage@@PB_W1II@Z
?GetOsInfoData@AvgEnvironment@@YGABUOsInfoData@1@XZ
?AvgUpperString@@YGHW4AvgCodePage@@PA_WIPB_WPAII@Z
?AvgCreateErrorCodeFromWin32@@YGHW4_AvgErrorCodeSeverity@@K@Z
?AvgNtdll_ZwCreateKeyTransacted@@YGJPAPAXKPAU_OBJECT_ATTRIBUTES@@KPAU_UNICODE_STRING@@KPAXPAK@Z
?AvgNtdll_ZwOpenKeyTransacted@@YGJPAPAXKPAU_OBJECT_ATTRIBUTES@@PAX@Z
?IsPathRooted@AvgBasPath@@YG_NPB_WI@Z
?GetPathRoot@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PB_WPAI@Z
?GetDirectoryPathFromFilenamePath@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PB_WIPAI@Z
?GetTempDirPath@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PAI@Z
ntdll
ZwSetEvent
ZwCreateEvent
ZwOpenSymbolicLinkObject
ZwQuerySymbolicLinkObject
ZwDelayExecution
ZwTerminateProcess
ZwWaitForSingleObject
RtlInitUnicodeString
ZwQueryVirtualMemory
ZwQueryInformationProcess
RtlAllocateHeap
RtlReAllocateHeap
RtlFreeHeap
ZwOpenKey
ZwQueryKey
RtlOpenCurrentUser
ZwClose
RtlNtStatusToDosError
ZwQueryValueKey
ZwCreateKey
memmove
memset
memcpy
ZwReleaseMutant
msvcr90
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
__winitenv
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
__CxxFrameHandler3
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
getchar
??2@YAPAXI@Z
_invoke_watson
_set_invalid_parameter_handler
swprintf_s
??3@YAXPAX@Z
_purecall
??_V@YAXPAX@Z
_CxxThrowException
user32
UnregisterDeviceNotification
MessageBoxW
RegisterDeviceNotificationW
Exports
Exports
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 416KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE