Static task
static1
Behavioral task
behavioral1
Sample
71a78b849152e31da8f7d782d89a9910307b60ddccf6a6b21870a5317e4d6431.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
71a78b849152e31da8f7d782d89a9910307b60ddccf6a6b21870a5317e4d6431.exe
Resource
win10v2004-20221111-en
General
-
Target
71a78b849152e31da8f7d782d89a9910307b60ddccf6a6b21870a5317e4d6431
-
Size
265KB
-
MD5
ec0e9eb4c728e5a273be1421a0033901
-
SHA1
9d9d66fc496e3d1b7368f9febaaabd533cf617e6
-
SHA256
71a78b849152e31da8f7d782d89a9910307b60ddccf6a6b21870a5317e4d6431
-
SHA512
3af89267e1dbc5ebe37310c394db3b53907b90c21b78d8c677b479c8c3d2598ba18e66d874c58da30bb6e5c72504c37f20e5ebfb5d71d7c998a8b0dc26f6e78a
-
SSDEEP
6144:PPX6v1rY+jNgM7uiQ0b2y829hvjcBGpTOiT9J0:KvBY+jNg70b2y86hvjcBGpTO20
Malware Config
Signatures
Files
-
71a78b849152e31da8f7d782d89a9910307b60ddccf6a6b21870a5317e4d6431.exe windows x86
718f302fb8fbc74ba0706f288e1087bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateClassMoniker
CoRevokeClassObject
CoRegisterClassObject
CoInitializeEx
GetRunningObjectTable
CoUninitialize
version
GetFileVersionInfoA
VerQueryValueA
kernel32
ResetEvent
WaitForSingleObject
GetVersionExA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
SetEvent
OpenEventA
TerminateThread
SuspendThread
ResumeThread
FormatMessageA
WaitForMultipleObjects
LocalFree
LocalUnlock
LocalLock
LocalAlloc
Sleep
CreateThread
RaiseException
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
FindCloseChangeNotification
FindFirstChangeNotificationA
GetExitCodeThread
LoadLibraryW
ReleaseMutex
CreateMutexA
WideCharToMultiByte
lstrlenW
GetDriveTypeA
MultiByteToWideChar
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
CreateMutexW
SetLastError
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleExA
GetSystemInfo
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
GetTempFileNameA
GetTempPathA
GetVersion
GetModuleFileNameA
FindClose
GetDiskFreeSpaceA
GetWindowsDirectoryA
FindNextChangeNotification
FindNextFileA
RemoveDirectoryA
DeleteFileA
GetFileAttributesA
CreateDirectoryA
MoveFileA
GetTickCount
SetCurrentDirectoryA
GetCurrentDirectoryA
IsBadWritePtr
VirtualProtect
IsBadReadPtr
GetModuleHandleA
SetUnhandledExceptionFilter
SetProcessWorkingSetSize
GetCurrentProcess
WriteFile
GetThreadContext
VirtualQuery
GetCurrentProcessId
OpenProcess
SetFilePointer
GlobalMemoryStatus
DeviceIoControl
CreateFileW
SetEnvironmentVariableA
GetEnvironmentVariableA
LCMapStringW
LCMapStringA
ReadFile
GetFullPathNameA
GetConsoleMode
GetConsoleCP
SetStdHandle
GetStringTypeW
GetStringTypeA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
SetHandleCount
GetTimeZoneInformation
GetStdHandle
VirtualAlloc
VirtualFree
HeapDestroy
HeapCreate
ExitProcess
HeapSize
TlsFree
TlsSetValue
LoadLibraryA
GetProcAddress
FreeLibrary
CreateEventA
GetLastError
CloseHandle
CreateProcessA
SetErrorMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
FindFirstFileA
SetEnvironmentVariableW
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetFileAttributesA
GetProcessHeap
SetEndOfFile
GetFileType
PeekNamedPipe
GetFileInformationByHandle
HeapReAlloc
RtlUnwind
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
ExitThread
HeapAlloc
HeapFree
user32
CharPrevA
CharNextA
RegisterWindowMessageA
ReleaseDC
GetClassInfoExA
UnregisterClassA
SetWindowsHookExA
GetMessageA
TranslateMessage
DispatchMessageA
GetClassInfoA
RegisterClassA
GetSystemMetrics
CreateWindowExA
DefWindowProcA
PostQuitMessage
SetTimer
KillTimer
DestroyWindow
PostThreadMessageA
FindWindowA
PostMessageA
IsWindow
SendMessageA
GetDC
RegisterClassExA
UnhookWindowsHookEx
advapi32
RegDeleteValueA
FreeSid
RegEnumKeyA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegNotifyChangeKeyValue
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
gdi32
GetDeviceCaps
shell32
SHGetFolderPathW
SHGetFolderPathA
shlwapi
PathGetDriveNumberW
PathAppendA
PathAddBackslashA
PathAppendW
setupapi
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiDeleteDeviceInfo
SetupDiDestroyDeviceInfoList
CM_Get_Parent
CM_Get_Device_ID_Size
CM_Get_Device_IDW
SetupDiGetDeviceInstanceIdW
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ