Static task
static1
Behavioral task
behavioral1
Sample
0c677bfc6ea0342e5f6e9dd11a143ae3117fc78f7d87513c3594de1e41d5739c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0c677bfc6ea0342e5f6e9dd11a143ae3117fc78f7d87513c3594de1e41d5739c.exe
Resource
win10v2004-20220901-en
General
-
Target
0c677bfc6ea0342e5f6e9dd11a143ae3117fc78f7d87513c3594de1e41d5739c
-
Size
903KB
-
MD5
5ac0a754807435f581520c3d90b1eb94
-
SHA1
25ae25d223ff71da8a1348838fe30c42abcf3cb9
-
SHA256
0c677bfc6ea0342e5f6e9dd11a143ae3117fc78f7d87513c3594de1e41d5739c
-
SHA512
ac194403c3a4d877b41317b3028a8b1cc65157bc1967689797e0c951020f35b801699fc77b2e5db74f84f440e0b30219e11ae55b5f569f22a702b36d56720499
-
SSDEEP
12288:bk4W/VIyt7NzpvxhwWSdKv0wkRjyMZBJdEmsRod0dUdKh8Loh2+6QPqAigjvLFaM:0tIyVNz7obvwh2+68qhgIHQ
Malware Config
Signatures
Files
-
0c677bfc6ea0342e5f6e9dd11a143ae3117fc78f7d87513c3594de1e41d5739c.exe windows x86
e2e5d39514e039fb1420d11d46f71728
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileSectionW
HeapCreate
GetThreadPriority
DeleteVolumeMountPointA
IsValidCodePage
GetLongPathNameW
CreateJobObjectW
MapViewOfFileEx
CopyFileExA
FindNextChangeNotification
SetThreadExecutionState
SuspendThread
GetDateFormatW
CreateSemaphoreA
CreateFileW
WideCharToMultiByte
OpenJobObjectA
ConvertDefaultLocale
GetOEMCP
GetDiskFreeSpaceW
GetUserDefaultLCID
EnumCalendarInfoW
SetFileTime
GetFullPathNameW
GetSystemDefaultLCID
OpenEventA
GetSystemDirectoryA
GetVersion
DeleteTimerQueueEx
WaitForMultipleObjectsEx
CreateEventW
ExpandEnvironmentStringsA
CompareStringA
GetUserDefaultLangID
GetPriorityClass
PostQueuedCompletionStatus
LCMapStringA
SetThreadContext
GetConsoleAliasExesA
FreeEnvironmentStringsW
DnsHostnameToComputerNameW
ReleaseMutex
CreateMailslotW
GetFileTime
SetThreadLocale
FindVolumeMountPointClose
GetWindowsDirectoryW
SetPriorityClass
GetThreadContext
GetSystemDirectoryW
SetCalendarInfoW
ResetEvent
GetDiskFreeSpaceExA
GetPrivateProfileStringW
MoveFileExW
OpenProcess
GetMailslotInfo
GetLocaleInfoA
CreateTimerQueueTimer
WritePrivateProfileStringW
GetThreadTimes
SetVolumeMountPointA
FindResourceExA
IsDBCSLeadByteEx
OpenFileMappingW
FindVolumeClose
GetStringTypeW
GetThreadLocale
GetConsoleAliasA
GetTimeFormatA
GetWindowsDirectoryA
GetEnvironmentStrings
GetProcessWorkingSetSize
GetNumberOfConsoleInputEvents
SetCalendarInfoA
FlushViewOfFile
GetModuleFileNameA
GetProcessVersion
SetNamedPipeHandleState
GetModuleFileNameW
lstrcmpiA
ReplaceFileA
SetEndOfFile
DuplicateHandle
SetProcessWorkingSetSize
WriteConsoleA
SwitchToThread
DefineDosDeviceW
HeapValidate
GetStringTypeExA
IsValidLocale
EnumCalendarInfoExA
GetCompressedFileSizeW
CreateWaitableTimerW
AddAtomA
EnumCalendarInfoA
CreateMutexW
ReadDirectoryChangesW
SetConsoleCtrlHandler
GetBinaryTypeW
FindResourceW
GetVolumeInformationW
VerSetConditionMask
GetPrivateProfileSectionNamesA
GetProfileSectionA
BindIoCompletionCallback
SetStdHandle
CreateDirectoryExA
GetFileType
GetAtomNameA
GetCurrentThread
GetCalendarInfoA
CancelIo
FindFirstVolumeA
SetConsoleActiveScreenBuffer
GetNumberFormatW
GetPrivateProfileStringA
FindResourceExW
MapViewOfFile
GetShortPathNameA
GetConsoleMode
ResetWriteWatch
GetBinaryTypeA
CreateIoCompletionPort
GetHandleInformation
DeleteTimerQueue
MoveFileWithProgressW
MapUserPhysicalPagesScatter
DosDateTimeToFileTime
SetConsoleTextAttribute
VerifyVersionInfoW
SetEvent
GetStringTypeExW
QueryInformationJobObject
CreateFileMappingW
ProcessIdToSessionId
FindFirstVolumeW
ReadProcessMemory
CreateMutexA
GetEnvironmentVariableW
AreFileApisANSI
GetStdHandle
GetStringTypeA
GetProfileStringW
SetSystemTimeAdjustment
GetCalendarInfoW
GetCompressedFileSizeA
CreateDirectoryExW
GetProcAddress
FreeUserPhysicalPages
GetFileAttributesA
ReplaceFileW
SetThreadPriorityBoost
GetConsoleAliasExesW
GetLocaleInfoW
DeleteTimerQueueTimer
GetConsoleAliasesA
SearchPathA
MapUserPhysicalPages
GetModuleHandleA
CreateDirectoryA
CreateWaitableTimerA
GetLogicalDriveStringsW
GetVolumePathNameA
GetProfileStringA
GetFileAttributesExW
CreateNamedPipeW
GetVolumeInformationA
GetCurrentConsoleFont
MoveFileWithProgressA
FreeEnvironmentStringsA
CreateFileMappingA
ExpandEnvironmentStringsW
ReleaseSemaphore
SetThreadIdealProcessor
SetConsoleOutputCP
CreateSemaphoreW
FlushFileBuffers
MultiByteToWideChar
LCMapStringW
GetPrivateProfileSectionW
RtlUnwind
GetUserDefaultUILanguage
VirtualProtect
CreateDirectoryW
GetProcessAffinityMask
GetPrivateProfileIntA
QueueUserWorkItem
OpenMutexW
SetCurrentDirectoryA
OpenFileMappingA
GetVolumeNameForVolumeMountPointA
FindAtomW
Module32First
FoldStringW
CopyFileA
GetLogicalDrives
OpenWaitableTimerW
CreateEventA
GetTempPathA
VirtualAlloc
DefineDosDeviceA
GetFileAttributesW
GetNamedPipeInfo
GetProfileIntA
GetACP
GetTapeStatus
HeapReAlloc
HeapAlloc
HeapSize
GetCPInfo
Sleep
HeapFree
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCommandLineA
HeapSetInformation
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
IsProcessorFeaturePresent
user32
RedrawWindow
advapi32
CloseServiceHandle
RegCreateKeyExW
RegSetKeySecurity
GetSecurityDescriptorSacl
CryptGenRandom
FreeSid
RegSetValueExW
RegQueryValueExA
GetSecurityDescriptorDacl
AddAce
MakeSelfRelativeSD
SetNamedSecurityInfoW
StartServiceA
RegEnumValueA
GetSidSubAuthority
RegisterEventSourceW
LookupAccountSidW
QueryServiceConfigW
CryptAcquireContextA
RegEnumKeyExA
SetServiceStatus
CryptHashData
RegEnumKeyExW
RegEnumValueW
RegOpenKeyA
IsValidSecurityDescriptor
oleaut32
VariantCopyInd
SysFreeString
SafeArrayGetUBound
SafeArrayGetLBound
VariantClear
SysAllocStringByteLen
VariantChangeType
SafeArrayPtrOfIndex
SysAllocStringLen
VariantCopy
SysReAllocStringLen
SysStringLen
VariantInit
VariantChangeTypeEx
GetActiveObject
GetErrorInfo
SafeArrayCreate
Sections
.text Size: 398KB - Virtual size: 398KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 466KB - Virtual size: 944KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ