Static task
static1
Behavioral task
behavioral1
Sample
7f1b3d4c389b535e829442c872da43e4e6be6627dd08eedce5175d531caf2835.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f1b3d4c389b535e829442c872da43e4e6be6627dd08eedce5175d531caf2835.exe
Resource
win10v2004-20221111-en
General
-
Target
7f1b3d4c389b535e829442c872da43e4e6be6627dd08eedce5175d531caf2835
-
Size
189KB
-
MD5
9336b88e827d6355131e631f22f3ece2
-
SHA1
f861dd821c93759871fb4842b5f99297ef3a6d2e
-
SHA256
7f1b3d4c389b535e829442c872da43e4e6be6627dd08eedce5175d531caf2835
-
SHA512
f0e692986a0f692ac6a53194f55b2d27b385c35d801f044e66185fe8554a11b66a98961105d5564f87e95d2177c1f3496babaa34e302e48837b82b6aa83576e9
-
SSDEEP
3072:uJIwscig5c5APJvmiUWAxK0bT+j6RtFcQ15DJTR+++AB7/SYVP1BE8+B3tL2KKN1:uJLKAxvNUNxK0bT+j6RtFcQ/DJTR+eZB
Malware Config
Signatures
Files
-
7f1b3d4c389b535e829442c872da43e4e6be6627dd08eedce5175d531caf2835.exe windows x86
7f04516cc436ece4e9a23e75024f7d09
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
DeleteFileA
GetModuleFileNameA
CreateDirectoryA
GetDiskFreeSpaceA
GetVolumeInformationA
GetLocalTime
SystemTimeToFileTime
GetSystemTime
GetDriveTypeA
ReleaseMutex
Sleep
GetWindowsDirectoryA
GetLastError
CreateMutexA
GetPrivateProfileStringA
CompareFileTime
CreateProcessA
GetTempPathA
ResumeThread
CreateThread
CopyFileA
DeviceIoControl
GetComputerNameA
GetFileSize
WaitForSingleObject
GetFileTime
WritePrivateProfileStringA
FileTimeToSystemTime
WriteFile
SetFilePointer
TerminateProcess
OpenProcess
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetSystemDirectoryA
FindFirstFileA
FindNextFileA
FindClose
DosDateTimeToFileTime
LocalFileTimeToFileTime
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
SetFileTime
GetFileAttributesA
SetFileAttributesA
CreateFileA
GetFileInformationByHandle
CloseHandle
FileTimeToLocalFileTime
FileTimeToDosDateTime
RemoveDirectoryA
IsValidCodePage
IsValidLocale
HeapAlloc
HeapFree
GetFileType
ReadFile
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetEndOfFile
SetHandleCount
GetStdHandle
SetStdHandle
HeapSize
SetUnhandledExceptionFilter
GetProcAddress
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LoadLibraryA
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
user32
MessageBoxA
advapi32
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
shell32
CommandLineToArgvW
ShellExecuteA
cabinet
FCICreate
FDICopy
FDIIsCabinet
FDIDestroy
FDICreate
FCIAddFile
FCIFlushCabinet
FCIDestroy
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE