Static task
static1
Behavioral task
behavioral1
Sample
ec662dcb810e8cb152d6908e5019eae95dfb67e09af13fab9239a2fea6c77164.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec662dcb810e8cb152d6908e5019eae95dfb67e09af13fab9239a2fea6c77164.exe
Resource
win10v2004-20221111-en
General
-
Target
ec662dcb810e8cb152d6908e5019eae95dfb67e09af13fab9239a2fea6c77164
-
Size
463KB
-
MD5
0113f1e100830eb8c906d32bf54d8500
-
SHA1
ecaef01b40c579432e23bc66a126d8735e3f78ae
-
SHA256
ec662dcb810e8cb152d6908e5019eae95dfb67e09af13fab9239a2fea6c77164
-
SHA512
1a9f74a6df89da7b6af3bea0627f3a640fcc7ca3780cdd5ae95d812117c5e40ccbdb951fd94df0db37b845c3d2f889bdc922135cedddc89083e249480cf4ea94
-
SSDEEP
6144:297fg7qaofnL3b3/woBsfaiM4e+aDkoD802Y802g802Y802W:29sOhfnXIM4HaDkI802Y802g802Y802
Malware Config
Signatures
Files
-
ec662dcb810e8cb152d6908e5019eae95dfb67e09af13fab9239a2fea6c77164.exe windows x86
f977949704e12c835586c3b02badaf18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
CreateDirectoryA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
MultiByteToWideChar
GetLastError
GetModuleFileNameA
SetLastError
CreateEventA
FindFirstFileA
CopyFileA
Sleep
WinExec
FindNextFileA
FindClose
GetLogicalDriveStringsA
ExpandEnvironmentStringsA
LockResource
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
IsValidCodePage
LoadResource
GetDriveTypeA
FindResourceA
GetOEMCP
GetACP
HeapSize
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
HeapFree
RtlUnwind
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetStdHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetProcessHeap
user32
DispatchMessageA
GetMessageA
LoadStringA
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
TranslateAcceleratorA
LoadAcceleratorsA
TranslateMessage
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
SHGetPathFromIDListA
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
ole32
CoInitialize
CoUninitialize
CoCreateInstance
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 335KB - Virtual size: 334KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
snwchik Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE