Static task
static1
Behavioral task
behavioral1
Sample
b7e7ac0fac15666ba0ef44759913c80539b8be49038b6b02b43bf2e98c89f103.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b7e7ac0fac15666ba0ef44759913c80539b8be49038b6b02b43bf2e98c89f103.exe
Resource
win10v2004-20220812-en
General
-
Target
b7e7ac0fac15666ba0ef44759913c80539b8be49038b6b02b43bf2e98c89f103
-
Size
204KB
-
MD5
e4ecb351794d90021b4ec811ec6ec3ff
-
SHA1
9ee90327fef294fb9b612525a777363a69e23a8d
-
SHA256
b7e7ac0fac15666ba0ef44759913c80539b8be49038b6b02b43bf2e98c89f103
-
SHA512
3d3e1402bfba0fd32bfc4ec80571d1d7d4983def270de0cea17a82dd69dffe65089826162242ce0de109d92c77810917b83576e748cf5f70ecbf19a3d749be03
-
SSDEEP
3072:kLMZqUA56dmgZXN6g9GWIt6Dk/O3BkZdnCVp68/JpTbT3nbF9t4IhAxFnKgTzn9H:a2dhRgWa68OGdCVTpjXR9tTSxFnK0zn
Malware Config
Signatures
Files
-
b7e7ac0fac15666ba0ef44759913c80539b8be49038b6b02b43bf2e98c89f103.exe windows x86
76b67d98ee006dad26f4ca799053da49
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
QueryServiceStatus
OpenThreadToken
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
SetServiceStatus
SetSecurityDescriptorDacl
RegisterServiceCtrlHandlerA
RegSetValueExA
RegEnumKeyA
InitializeSecurityDescriptor
StartServiceCtrlDispatcherA
OpenProcessToken
FreeSid
AllocateAndInitializeSid
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
setupapi
SetupRemoveFromDiskSpaceListA
SetupQueryDrivesInDiskSpaceListA
SetupDestroyDiskSpaceList
SetupAdjustDiskSpaceListA
SetupDuplicateDiskSpaceListA
SetupGetInfFileListA
SetupScanFileQueueA
SetupInstallFilesFromInfSectionA
SetupOpenAppendInfFileA
SetupOpenFileQueue
SetupGetSourceFileLocationA
SetupGetSourceFileSizeA
SetupCloseFileQueue
SetupCloseInfFile
SetupCommitFileQueueA
SetupDecompressOrCopyFileA
SetupQueryInfFileInformationA
SetupOpenInfFileA
kernel32
HeapSize
SetEndOfFile
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
InitializeCriticalSection
CreateFileA
GetOEMCP
GetACP
Sleep
CloseHandle
GetStartupInfoA
CopyFileA
DeleteFileA
GetTickCount
CreateEventA
GetVersion
GetVolumeInformationA
LoadLibraryA
ExitProcess
WideCharToMultiByte
GetModuleFileNameA
CreateProcessA
SetFileAttributesA
SetTapePosition
VirtualProtect
BeginUpdateResourceA
GetSystemInfo
HeapAlloc
GetModuleHandleA
GetCommandLineA
GetVersionExA
GetLastError
WriteFile
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
HeapFree
ReadFile
SetFilePointer
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetStdHandle
FlushFileBuffers
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetCPInfo
GetLocaleInfoA
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ