?TLS@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
c7613ef25e503a3392e1c7454e5fb33299b9b850ef8b8dd5fc54a2f24d621598.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7613ef25e503a3392e1c7454e5fb33299b9b850ef8b8dd5fc54a2f24d621598.exe
Resource
win10v2004-20221111-en
General
-
Target
c7613ef25e503a3392e1c7454e5fb33299b9b850ef8b8dd5fc54a2f24d621598
-
Size
146KB
-
MD5
2f8a5236dbbf9c6f52dc83f6a00e0a10
-
SHA1
e943a8c58b5927a85d30778abe64ab1780feefe1
-
SHA256
c7613ef25e503a3392e1c7454e5fb33299b9b850ef8b8dd5fc54a2f24d621598
-
SHA512
f1c41e9d2115e788cd9765c22a25aaa90a33f888169df72f22b8c38e66e2170706141a559e2ee26650337fcde4a1e5a7deb5c24260be859aeefc9b54453d31b2
-
SSDEEP
3072:JYspJf25jpHcslnOxJkmE0sty1wSZL6tkOlQRbzNtv:xpJmVHcPJkV0pwSZL6tkZh
Malware Config
Signatures
Files
-
c7613ef25e503a3392e1c7454e5fb33299b9b850ef8b8dd5fc54a2f24d621598.exe windows x86
a3b190e7a802c5c12028ccc9b118a211
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsPrefixA
kernel32
GetSystemDefaultUILanguage
WaitForSingleObjectEx
TlsGetValue
SetThreadContext
GlobalReAlloc
SetPriorityClass
WinExec
GetCurrentThread
DeleteFileW
RemoveDirectoryW
FlushFileBuffers
SetSystemTime
GetFileAttributesA
GetCurrentDirectoryW
HeapUnlock
GetSystemTime
FindResourceExA
GlobalLock
LoadLibraryA
GetModuleFileNameW
DeleteAtom
MulDiv
TransactNamedPipe
CancelIo
ConnectNamedPipe
GetOEMCP
GetLongPathNameW
SetLocalTime
GetSystemDirectoryA
GetNumberFormatW
SetupComm
VirtualFree
ConvertDefaultLocale
RemoveDirectoryA
GlobalMemoryStatus
FindFirstChangeNotificationW
VirtualProtect
MoveFileExW
GetWindowsDirectoryA
GetTempFileNameA
lstrcatA
GetComputerNameExA
ResumeThread
SetCommTimeouts
FreeResource
GlobalAddAtomA
GetModuleFileNameA
GetTempPathA
GetFileAttributesExA
FoldStringW
CreateFileMappingA
InitializeCriticalSection
GetCommProperties
CopyFileW
QueryDosDeviceW
GetUserDefaultLCID
GlobalHandle
GetThreadPriority
IsBadCodePtr
SetCommState
SetCommMask
GetOverlappedResult
GetThreadTimes
lstrcatW
EscapeCommFunction
CreateFileA
VerifyVersionInfoW
MoveFileA
GetShortPathNameW
SearchPathW
AddAtomA
GetCommandLineW
CreateEventA
SetHandleInformation
CreateEventW
ReadFile
GetCommTimeouts
EnumResourceNamesW
IsBadReadPtr
CreateMutexW
QueryPerformanceCounter
FindCloseChangeNotification
GetSystemWindowsDirectoryA
GetStartupInfoW
lstrcpynA
GetCommState
GetComputerNameExW
CreateWaitableTimerA
GetPriorityClass
lstrlenW
CreateThread
SetNamedPipeHandleState
HeapSize
GlobalFlags
CompareFileTime
SystemTimeToFileTime
OpenSemaphoreW
SetFileTime
CreateSemaphoreW
TryEnterCriticalSection
IsValidLocale
OpenFile
DefineDosDeviceW
user32
GetClientRect
GetForegroundWindow
Exports
Exports
Sections
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 967B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 558B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ