Static task
static1
Behavioral task
behavioral1
Sample
cac76fc8527f8964faff37511fb4b1a8b9038ae1260bd8e6fbf2ec4ef1617023.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cac76fc8527f8964faff37511fb4b1a8b9038ae1260bd8e6fbf2ec4ef1617023.exe
Resource
win10v2004-20220901-en
General
-
Target
cac76fc8527f8964faff37511fb4b1a8b9038ae1260bd8e6fbf2ec4ef1617023
-
Size
163KB
-
MD5
f377226040ff9b25633e8210f66e3b11
-
SHA1
975922ea867b45efd72cf2259497a2e95421f72f
-
SHA256
cac76fc8527f8964faff37511fb4b1a8b9038ae1260bd8e6fbf2ec4ef1617023
-
SHA512
abe0e541512d68e930471ee6c3c0678cce8eb8543eb12eea1059b73f917dc60128801e89a9a0438cf834ae347839c662dcbca45eaa1db944f5c16aeb853f27eb
-
SSDEEP
3072:Gyh7QAJrhSQOeoTu3++Vh7/+dphYiEqndISlSm1oHVlNv4Zn12eNJoIqn7klytb:GI7QQrh6RTu3Xj7/IYiE+aSl4HVbAZ1z
Malware Config
Signatures
Files
-
cac76fc8527f8964faff37511fb4b1a8b9038ae1260bd8e6fbf2ec4ef1617023.exe windows x86
305a89cbffc7a749741607854c46848a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
untfs
??1NTFS_UPCASE_TABLE@@UAE@XZ
?Write@NTFS_FRS_STRUCTURE@@QAEEXZ
?InsertIntoFile@NTFS_ATTRIBUTE@@UAEEPAVNTFS_FILE_RECORD_SEGMENT@@PAVNTFS_BITMAP@@@Z
??1NTFS_SA@@UAE@XZ
?QueryExtent@NTFS_EXTENT_LIST@@QBEEKPAVBIG_INT@@00@Z
?IsFree@NTFS_BITMAP@@QBEEVBIG_INT@@0@Z
ChkdskEx
??0NTFS_SA@@QAE@XZ
?Read@NTFS_SA@@UAEEXZ
??1NTFS_BITMAP_FILE@@UAE@XZ
??0NTFS_BOOT_FILE@@QAE@XZ
Format
?IsDosName@NTFS_SA@@SGEPBU_FILE_NAME@@@Z
?AddFileNameAttribute@NTFS_FILE_RECORD_SEGMENT@@QAEEPAU_FILE_NAME@@@Z
?ReadAgain@NTFS_FRS_STRUCTURE@@QAEEVBIG_INT@@@Z
??0NTFS_BITMAP@@QAE@XZ
?GetNext@NTFS_INDEX_TREE@@QAEPBU_INDEX_ENTRY@@PAKPAEE@Z
?Initialize@NTFS_UPCASE_FILE@@QAEEPAVNTFS_MASTER_FILE_TABLE@@@Z
?ComputeFileNameSignature@NTFS_MFT_INFO@@CGXKPAU_FILE_NAME@@QAE@Z
??0NTFS_ATTRIBUTE@@QAE@XZ
?QueryVolumeFlagsAndLabel@NTFS_SA@@QAEGPAE00PAVWSTRING@@@Z
?Flush@NTFS_FILE_RECORD_SEGMENT@@QAEEPAVNTFS_BITMAP@@PAVNTFS_INDEX_TREE@@E@Z
??0NTFS_ATTRIBUTE_LIST@@QAE@XZ
?Initialize@NTFS_FILE_RECORD_SEGMENT@@QAEEVBIG_INT@@PAVNTFS_MASTER_FILE_TABLE@@@Z
??1NTFS_ATTRIBUTE_DEFINITION_TABLE@@UAE@XZ
??0NTFS_ATTRIBUTE_DEFINITION_TABLE@@QAE@XZ
?Initialize@NTFS_BITMAP_FILE@@QAEEPAVNTFS_MASTER_FILE_TABLE@@@Z
??0NTFS_LOG_FILE@@QAE@XZ
??0NTFS_EXTENT_LIST@@QAE@XZ
?TakeCensus@NTFS_SA@@QAEEPAVNTFS_MASTER_FILE_TABLE@@KPAUNTFS_CENSUS_INFO@@@Z
??1NTFS_MFT_INFO@@UAE@XZ
??0NTFS_BITMAP_FILE@@QAE@XZ
?GetNextAttributeListEntry@NTFS_ATTRIBUTE_LIST@@QBEPBU_ATTRIBUTE_LIST_ENTRY@@PBU2@@Z
?QueryExtentList@NTFS_ATTRIBUTE_RECORD@@QBEEPAVNTFS_EXTENT_LIST@@@Z
??1NTFS_BAD_CLUSTER_FILE@@UAE@XZ
?ComputeDupInfoSignature@NTFS_MFT_INFO@@CGXPAU_DUPLICATED_INFORMATION@@QAE@Z
?SetVolumeFlag@NTFS_SA@@QAEEGPAE@Z
??0NTFS_MFT_INFO@@QAE@XZ
?Initialize@NTFS_FILE_RECORD_SEGMENT@@QAEEVBIG_INT@@KPAVNTFS_MASTER_FILE_TABLE@@@Z
?ReadList@NTFS_ATTRIBUTE_LIST@@QAEEXZ
?AllocateFileRecordSegment@NTFS_MASTER_FILE_TABLE@@QAEEPAVBIG_INT@@E@Z
??0NTFS_ATTRIBUTE_RECORD@@QAE@XZ
?CompareDupInfo@NTFS_MFT_INFO@@SGEPAXPAU_FILE_NAME@@@Z
?Initialize@NTFS_MFT_INFO@@QAEEVBIG_INT@@PAVNTFS_UPCASE_TABLE@@EE_K@Z
crtdll
mblen
_wcsset
_mbslwr
__threadid
_lfind
_mbsnextc
fabs
sinh
_mbscat
_fputwchar
localtime
_strlwr
_clearfp
_mbsnbcat
_vsnwprintf
_finite
_fstat
_acmdln_dll
wcstok
_flushall
_ismbchira
_dup
time
_ismbclegal
freopen
_cabs
_mbbtype
wcscoll
_popen
_CIsinh
qsort
strstr
strcoll
_mbsnbicmp
_mbsncpy
fscanf
_CIasin
sin
_mbsrev
_sopen
fwprintf
_nextafter
_mbbtombc
_CIsqrt
fwrite
msvcrt
__p__commode
_isatty
strspn
_searchenv
_execl
_wsopen
_wstat
fgetc
_rmtmp
__getmainargs
exit
cosh
_setsystime
_purecall
_wspawnvp
_getdrive
_wfindfirst64
__threadhandle
_popen
_wexecl
_execv
vprintf
_commode
??0bad_cast@@AAE@PBQBD@Z
clearerr
__p__fmode
_spawnv
rename
_inpd
_putwch
_snwprintf
__set_app_type
??1type_info@@UAE@XZ
_loaddll
_HUGE
_execle
__p___mb_cur_max
__lc_handle
memcpy
strpbrk
_cwait
_wspawnlp
atof
_cprintf
??4bad_typeid@@QAEAAV0@ABV0@@Z
?before@type_info@@QBEHABV1@@Z
kernel32
InitializeCriticalSection
GetSystemDirectoryW
GetLastError
Toolhelp32ReadProcessMemory
EnumCalendarInfoW
FreeEnvironmentStringsA
FreeResource
SetProcessWorkingSetSize
WriteConsoleOutputCharacterW
GetConsoleAliasExesLengthA
CreateMailslotA
UTUnRegister
GetConsoleAliasesA
SetConsoleCursorInfo
SizeofResource
lstrcat
GetExitCodeThread
GlobalFindAtomA
BackupWrite
GetLocaleInfoW
SetLocaleInfoW
GetSystemWindowsDirectoryA
SetFileApisToANSI
IsValidCodePage
OutputDebugStringA
CreateThread
SetInformationJobObject
LoadLibraryA
SetConsoleInputExeNameA
UnregisterWaitEx
FindVolumeClose
GetDefaultCommConfigA
VirtualAllocEx
GetComputerNameExW
GetConsoleFontSize
FindFirstVolumeMountPointA
Beep
ProcessIdToSessionId
DeviceIoControl
GetFileAttributesA
VirtualAlloc
oleaut32
VarR8FromUI4
VarUI2FromI8
VarUI2FromI1
VarUI2FromI4
VarIdiv
VarCyFromStr
VarCyFromI4
LPSAFEARRAY_Unmarshal
VarCyMulI4
VarR8Pow
VarRound
VarCyCmpR8
GetAltMonthNames
VarBoolFromUI1
VarDateFromR4
VarUI4FromDate
OleCreatePropertyFrame
VarUI2FromR4
VarUI1FromI4
VarPow
VarBoolFromUI4
VarInt
LPSAFEARRAY_Size
SafeArrayCopyData
VarUI2FromStr
VarCyFromUI4
SysAllocStringLen
VarI8FromR8
VarI8FromDec
VarUI4FromI2
BstrFromVector
VarCyAbs
VarI8FromUI2
VarDateFromI8
SysStringLen
VarFormatFromTokens
VariantCopyInd
VarUI1FromStr
VarUI4FromStr
SafeArrayCreateEx
VariantInit
SafeArrayCreateVector
BSTR_UserMarshal
VarDateFromDisp
sqlunirl
_DefMDIChildProc_@16
_SendDlgItemMessage@20
_RegEnumValue_@32
_GetDriveType_@4
_GetEnvironmentStrings_@4
_AccessCheckAndAuditAlarm_@44
_WriteProfileString_@12
_GetToolsFilePath@16
_EnumFonts_@16
_ResetDC_@8
_GetComputerName@8
_CommDlg_OpenSave_GetSpec@12
_InsertMenuItem_@16
_GetBinaryType_@8
_DlgDirSelectComboBoxEx_@16
_WaitNamedPipe_@8
_GetKeyNameText_@12
_GetServiceKeyName_@16
_CopyFileEx_@24
_OpenDesktop_@16
_strerror_@4
_lstrcat_@8
_GetPrivateProfileSection_@16
_CreateMDIWindow_@40
_RegConnectRegistry_@12
_ChooseColor_@4
_GetTextExtentPoint@16
_GetPrivateProfileString_@24
_GetTextExtentPoint32@16
_GetShortPathName_@12
_NDdeTrustedShareEnum_@24
_DefWindowProc@16
_RegDeleteKey_@8
user32
EndDialog
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ