Static task
static1
Behavioral task
behavioral1
Sample
b6f71e8f9e147b7c73b87d1c1e019842b445230edf54b617ec9c18a6aa418e59.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6f71e8f9e147b7c73b87d1c1e019842b445230edf54b617ec9c18a6aa418e59.exe
Resource
win10v2004-20221111-en
General
-
Target
b6f71e8f9e147b7c73b87d1c1e019842b445230edf54b617ec9c18a6aa418e59
-
Size
504KB
-
MD5
86447465b59acd147c951c352ad9772b
-
SHA1
48510c10fde03ccc05b6f47479515b3cc30ffd27
-
SHA256
b6f71e8f9e147b7c73b87d1c1e019842b445230edf54b617ec9c18a6aa418e59
-
SHA512
683ca38d5f427745d42b0e15f79abf86e6d21a605f3f394b3d4f90e9a0b2709fc00fcee68393073c5ba40a9d0ca64803a473065ba1a4fc8038e83315c81e26be
-
SSDEEP
12288:U4t8mANGCP+nDfg3sTwHNAUft7lyuzKeFL5R/5/LFiRZI6Pz89cEYJouHbz+Wrm9:UEPH8xGwHp7V
Malware Config
Signatures
Files
-
b6f71e8f9e147b7c73b87d1c1e019842b445230edf54b617ec9c18a6aa418e59.exe windows x86
fd086f1d2d658e36a15ddf62ca55d716
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
__CxxQueryExceptionSize
__CxxUnregisterExceptionObject
_cexit
_amsg_exit
__set_app_type
_XcptFilter
__wgetmainargs
_configthreadlocale
__p__commode
__p__fmode
__FrameUnwindFilter
_time64
??2@YAPAXI@Z
??3@YAXPAX@Z
sprintf
memmove
strncmp
strchr
atol
atoi
_strtoui64
??_U@YAPAXI@Z
_strupr
strrchr
_gmtime32_s
_wcsupr
wcsncmp
wcstombs
strncpy
strstr
free
memset
_CxxThrowException
_strnicmp
__CxxDetectRethrow
__CxxRegisterExceptionObject
__CxxExceptionFilter
malloc
__CxxFrameHandler3
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
memcpy
_except_handler3
_crt_debugger_hook
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_encode_pointer
kernel32
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
GetModuleHandleA
UnmapViewOfFile
CloseHandle
InterlockedExchange
VirtualProtect
VirtualQuery
GetCurrentThreadId
InterlockedIncrement
InterlockedCompareExchange
InterlockedDecrement
GetCurrentProcessId
CreateMutexA
WaitForSingleObject
ReleaseMutex
FindResourceA
GetCurrentProcess
LockResource
CreateToolhelp32Snapshot
Module32First
GetProcAddress
Module32Next
EnumResourceNamesA
VirtualAlloc
CreateEventA
ExitProcess
SetEvent
GetExitCodeThread
TerminateThread
CreateThread
VirtualFree
GetModuleFileNameA
GetSystemTime
SystemTimeToFileTime
GetCommandLineW
LocalFree
GlobalAlloc
GetSystemInfo
GetWindowsDirectoryA
GetVolumeInformationA
CreateFileA
DeviceIoControl
GetCurrentThread
CreateFileW
GlobalFree
LoadLibraryA
TlsAlloc
TlsSetValue
TlsGetValue
TlsFree
FreeLibrary
MapViewOfFile
CreateFileMappingA
lstrcmpA
LocalAlloc
GetModuleFileNameW
GetLastError
OutputDebugStringA
TerminateProcess
LoadResource
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
lstrlenW
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
advapi32
CryptGenRandom
OpenThreadToken
CloseEventLog
ReadEventLogA
GetNumberOfEventLogRecords
OpenEventLogA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
SetThreadToken
CryptAcquireContextA
RevertToSelf
oleaut32
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
VariantInit
SysFreeString
SystemTimeToVariantTime
SysAllocString
VariantClear
msvcm80
__setusermatherr_m
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
mscoree
GetHashFromFileW
_CorExeMain
wintrust
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminEnumCatalogFromHash
WinVerifyTrust
CryptCATAdminReleaseContext
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
crypt32
CertFindCertificateInStore
CertGetNameStringA
CryptMsgClose
CertCloseStore
CryptQueryObject
CryptMsgGetParam
CryptDecodeObject
CertFreeCertificateContext
iphlpapi
GetAdaptersInfo
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
CoTaskMemAlloc
CoSetProxyBlanket
shell32
CommandLineToArgvW
setupapi
SetupDiGetDeviceInterfaceDetailA
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiEnumDeviceInfo
SetupDiClassNameFromGuidA
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
rpcrt4
UuidCreate
Sections
.text Size: 212KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 188KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ