Static task
static1
Behavioral task
behavioral1
Sample
7d1c88ff11e69ffd5b5417d4a6933f88de116f3a2e8a2ea5dec6ffc2e50ff16b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d1c88ff11e69ffd5b5417d4a6933f88de116f3a2e8a2ea5dec6ffc2e50ff16b.exe
Resource
win10v2004-20221111-en
General
-
Target
7d1c88ff11e69ffd5b5417d4a6933f88de116f3a2e8a2ea5dec6ffc2e50ff16b
-
Size
263KB
-
MD5
037acdf8535e3a9d179db8ba3ea3c6d5
-
SHA1
09fd7494cd62c83a10aaaf42f4d98d2dc74c88f7
-
SHA256
7d1c88ff11e69ffd5b5417d4a6933f88de116f3a2e8a2ea5dec6ffc2e50ff16b
-
SHA512
2b58362ca232e23cbb3c4f6f8c0cb7d26a2c801bec17c7211e7b580e9415599f7baf73167a490dcbd1e12b5fe9a41362b51bd69149749509796676b7df50cd36
-
SSDEEP
3072:/mqMXukM2XRfBPAvEJdUoIzED1NZIs7Uzf8qhdez6LT9I+HtVWOXd3WWNtFbKe3R:/eDM2ZBosJRD/Zs8AXHKuAOcWNtZPr7
Malware Config
Signatures
Files
-
7d1c88ff11e69ffd5b5417d4a6933f88de116f3a2e8a2ea5dec6ffc2e50ff16b.exe windows x86
0da04b85b7d70a3b23e8decf270c6978
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
SetLastError
RemoveDirectoryA
CopyFileA
SetFileAttributesA
FindClose
Process32FirstW
WritePrivateProfileStringA
GetModuleFileNameA
Process32NextW
FindNextFileA
CreateToolhelp32Snapshot
CloseHandle
GetCurrentProcessId
DeleteFileA
FreeResource
FindResourceW
FindFirstFileA
GetModuleHandleW
WideCharToMultiByte
SizeofResource
GetFileAttributesA
MultiByteToWideChar
LockResource
CreateFileA
DeviceIoControl
SetEndOfFile
CreateFileW
OutputDebugStringW
WriteConsoleW
SetStdHandle
ReadConsoleW
LoadLibraryExW
SetCurrentDirectoryA
CreateDirectoryA
GetEnvironmentVariableA
GetModuleFileNameW
TerminateProcess
CreateEventA
Sleep
OpenProcess
GetCurrentProcess
SetPriorityClass
GetVolumeInformationW
LocalFree
GetSystemDirectoryW
LoadResource
GetComputerNameW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetConsoleMode
GetConsoleCP
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStringTypeW
HeapFree
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetProcAddress
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsDebuggerPresent
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
IsValidCodePage
GetACP
GetOEMCP
GetCurrentThreadId
GetStdHandle
GetFileType
GetProcessHeap
ReadFile
SetFilePointerEx
FlushFileBuffers
WriteFile
user32
GetWindowThreadProcessId
PeekMessageW
CharToOemA
PostMessageW
EnumWindows
MessageBoxA
GetWindowLongW
advapi32
CryptCreateHash
CryptAcquireContextW
CryptGetHashParam
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
ConvertSidToStringSidW
LookupAccountNameW
CryptHashData
shell32
ShellExecuteA
SHGetFolderPathA
SHAppBarMessage
wininet
InternetCloseHandle
InternetOpenW
InternetOpenUrlW
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ