Static task
static1
Behavioral task
behavioral1
Sample
7dd39df901bddc1e5aea804791e39937f19e2572ce8f512fe6604de248a40c6d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7dd39df901bddc1e5aea804791e39937f19e2572ce8f512fe6604de248a40c6d.exe
Resource
win10v2004-20220812-en
General
-
Target
7dd39df901bddc1e5aea804791e39937f19e2572ce8f512fe6604de248a40c6d
-
Size
297KB
-
MD5
17c5a17d7d2b9ee5c175867d14454804
-
SHA1
15f4527a601194920d95426e5130995364e941db
-
SHA256
7dd39df901bddc1e5aea804791e39937f19e2572ce8f512fe6604de248a40c6d
-
SHA512
4a6cb9d2d77b08717982cf0ffc9241989b7d7448c7a1cb083c3ab6f83cf20aa554b36de87ed6608868c13b5b3413c0c934e31d580e5967ff16d1311cab213e1d
-
SSDEEP
6144:VTuYP5Hghu5xDemuPJ0DmL8c6HEVIvz7OSoRjZUacH/8dckgT9Kv:VTuUWhOTK0DmqkeWSohnUUdczk
Malware Config
Signatures
Files
-
7dd39df901bddc1e5aea804791e39937f19e2572ce8f512fe6604de248a40c6d.exe windows x86
dd31040c1bbad5868832418b4c890eaf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
GetWindowsDirectoryW
HeapFree
CompareStringA
WritePrivateProfileStructW
GetThreadContext
LCMapStringW
WriteFile
FindClose
GetSystemInfo
ReadFile
SetStdHandle
RaiseException
OpenSemaphoreA
GetConsoleOutputCP
CreateFileA
IsValidCodePage
WideCharToMultiByte
SetFilePointer
FatalAppExitA
CreateFileMappingA
WaitForSingleObject
CreateFileW
ResumeThread
GetStdHandle
CreateProcessW
LCMapStringA
HeapAlloc
VirtualFree
TlsGetValue
SetUnhandledExceptionFilter
RtlUnwind
ReleaseSemaphore
VirtualProtectEx
TlsAlloc
OpenMutexA
WriteProcessMemory
GetPrivateProfileStringW
FreeLibrary
MapViewOfFileEx
GetSystemDirectoryW
GetCurrentThreadId
SuspendThread
EnumSystemLocalesA
DeviceIoControl
VirtualAlloc
CreateRemoteThread
GetDateFormatA
SetConsoleCtrlHandler
CreateMutexA
FlushFileBuffers
ReleaseMutex
CreateSemaphoreA
GetTempPathW
WriteConsoleW
HeapDestroy
GetPrivateProfileStructW
UnhandledExceptionFilter
GetFullPathNameW
GetConsoleCP
GetFileType
IsDebuggerPresent
ReadProcessMemory
GetTimeZoneInformation
GetSystemDefaultLangID
LeaveCriticalSection
RemoveDirectoryW
GetModuleHandleA
SetThreadAffinityMask
GetACP
FindFirstFileW
HeapReAlloc
SetProcessWorkingSetSize
TlsSetValue
SetLastError
TlsFree
SetHandleCount
FindNextFileW
CopyFileW
WriteConsoleA
MoveFileW
HeapSize
CloseHandle
TerminateThread
ExpandEnvironmentStringsW
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
EnterCriticalSection
IsValidLocale
GetTimeFormatA
UnmapViewOfFile
InitializeCriticalSectionAndSpinCount
CompareStringW
WritePrivateProfileStringW
OpenFileMappingA
GetShortPathNameW
QueryDosDeviceW
DeleteCriticalSection
GetModuleHandleW
GetDriveTypeW
GetOEMCP
OpenProcess
GetUserDefaultLCID
GetLogicalDrives
GetCommandLineA
SetEnvironmentVariableA
FreeEnvironmentStringsA
GetConsoleMode
GetLocalTime
advapi32
AllocateAndInitializeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
LookupPrivilegeValueW
CreateServiceW
RegLoadKeyW
RegDeleteKeyW
RegQueryInfoKeyW
InitializeAcl
FreeSid
QueryServiceConfigW
RegQueryValueExW
RegSetValueExW
CloseServiceHandle
DeleteService
GetLengthSid
InitializeSecurityDescriptor
StartServiceW
RegDeleteValueW
EnumServicesStatusW
OpenProcessToken
RegCreateKeyExW
RegEnumValueW
OpenSCManagerW
AdjustTokenPrivileges
SetSecurityDescriptorOwner
RegUnLoadKeyW
RegCloseKey
RegEnumKeyExW
RegSetKeySecurity
OpenServiceW
QueryServiceStatus
RegOpenKeyExW
ControlService
ole32
OleInitialize
OleUninitialize
user32
PostMessageW
SendMessageTimeoutW
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
IsWindowVisible
GetClassNameW
GetWindowTextW
GetDC
CreatePopupMenu
OffsetRect
MessageBeep
CopyIcon
UpdateLayeredWindow
PostQuitMessage
GetClassInfoExA
GetDlgItemTextA
CharNextA
WinHelpA
DestroyCursor
SetDlgItemInt
SetMenu
InvalidateRect
GetSysColorBrush
PostMessageA
LoadCursorA
gdi32
GetLayout
faultrep
AddERExcludedApplicationW
ReportHang
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 252KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ