Static task
static1
Behavioral task
behavioral1
Sample
7370b781af66eda87dcf5a9f58c9a4c086b04055e33b2a724a7cbee4307a0745.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7370b781af66eda87dcf5a9f58c9a4c086b04055e33b2a724a7cbee4307a0745.exe
Resource
win10v2004-20221111-en
General
-
Target
7370b781af66eda87dcf5a9f58c9a4c086b04055e33b2a724a7cbee4307a0745
-
Size
196KB
-
MD5
e27b8da5500bc70a78c77eeaf98a4c75
-
SHA1
b8091466d29a34608b9e5e03f33b8ba405f80547
-
SHA256
7370b781af66eda87dcf5a9f58c9a4c086b04055e33b2a724a7cbee4307a0745
-
SHA512
53cae022fb874dffa48aae77d76775ab2fb9ba65ec903240ec59eb53659e4ac63970da23105dd8de8f66c46e23fa88e0197623f2d40c6d0221ec7f78628e3849
-
SSDEEP
6144:85bq72jCx+Q6opU5qPAJ2woEag6yn82/9xq9S8Xp6:MjL1opU5qPAJ2vEarSqPY
Malware Config
Signatures
Files
-
7370b781af66eda87dcf5a9f58c9a4c086b04055e33b2a724a7cbee4307a0745.exe windows x86
12142ca43448c59c0f2738ad3a0aabc4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
FileTimeToDosDateTime
GetFileTime
ReadFile
SetConsoleMode
GetConsoleMode
LeaveCriticalSection
HeapFree
GetProcessHeap
EnterCriticalSection
lstrcpynA
HeapAlloc
lstrcmpiA
lstrlenA
GetCurrentProcess
InitializeCriticalSection
ReleaseMutex
WaitForSingleObject
InterlockedExchange
CreateMutexA
SetConsoleCtrlHandler
ExitProcess
TerminateProcess
GetCommandLineA
UnhandledExceptionFilter
WideCharToMultiByte
HeapDestroy
HeapCreate
VirtualFree
SetVolumeLabelA
GetFileAttributesA
WriteFile
MultiByteToWideChar
GetTimeZoneInformation
GetStringTypeW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
SetFilePointer
LCMapStringA
LCMapStringW
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
GetCPInfo
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
SetStdHandle
GetProcAddress
LoadLibraryA
SetEndOfFile
FindClose
FindFirstFileA
FindNextFileA
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
SetFileAttributesA
CreateFileA
GetLastError
GetVersion
SetFileTime
CloseHandle
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetCurrentDirectoryA
FileTimeToSystemTime
DeleteFileA
CreateDirectoryA
advapi32
GetSecurityDescriptorControl
OpenProcessToken
AdjustTokenPrivileges
GetKernelObjectSecurity
LookupPrivilegeValueA
IsValidSecurityDescriptor
GetSecurityDescriptorDacl
SetKernelObjectSecurity
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
IsValidAcl
GetSecurityDescriptorGroup
GetSecurityDescriptorLength
IsValidSid
user32
CharToOemA
OemToCharA
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.prdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE