Static task
static1
Behavioral task
behavioral1
Sample
b7c355f05a6c4c31cc10821618b6d2787e71e1012c75f4b4969373411051d5ab.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b7c355f05a6c4c31cc10821618b6d2787e71e1012c75f4b4969373411051d5ab.exe
Resource
win10v2004-20221111-en
General
-
Target
b7c355f05a6c4c31cc10821618b6d2787e71e1012c75f4b4969373411051d5ab
-
Size
38KB
-
MD5
8014e7ebac8594b6a925e3cec6ddac81
-
SHA1
a930147559213e6aecc1b38f511e515547c92fc9
-
SHA256
b7c355f05a6c4c31cc10821618b6d2787e71e1012c75f4b4969373411051d5ab
-
SHA512
cd4335ee2a37362e848ebb05adcf7a41d279c5799de99cdceef22c76284974ec5c50c448f5d8bff711489877b645bfbe5c1b1d76c0ee856153ac59179dce7e6c
-
SSDEEP
768:3w3vnUYp17if7OiD/0w2TwenaVf70EcqwJF+wa/DDXF99IcVpEWZ:3w/pv7ifRa187NvpIcrEO
Malware Config
Signatures
Files
-
b7c355f05a6c4c31cc10821618b6d2787e71e1012c75f4b4969373411051d5ab.exe windows x86
ac72028382b8ea6a01ed429a2ebd329c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
MoveFileA
SystemTimeToTzSpecificLocalTime
GetSystemTime
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
CreateThread
SetFileTime
GetFileTime
GetSystemDirectoryA
GetWindowsDirectoryA
WaitForSingleObject
OpenProcess
GetLastError
lstrcmpA
FileTimeToSystemTime
FileTimeToLocalFileTime
CopyFileA
MultiByteToWideChar
lstrcpyA
GetCommandLineA
InterlockedIncrement
InterlockedDecrement
SetEvent
CreateEventA
FreeLibrary
ResetEvent
GetCurrentProcess
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateIoCompletionPort
SetLastError
PostQueuedCompletionStatus
SetThreadPriority
GetThreadPriority
ReadDirectoryChangesW
GetQueuedCompletionStatus
GetCurrentThread
OutputDebugStringA
lstrcatA
GetCurrentProcessId
Sleep
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
GetVolumeInformationA
CreateProcessA
GetThreadContext
ReadProcessMemory
GetModuleFileNameA
lstrcmpiA
GetModuleHandleA
GetProcAddress
VirtualAllocEx
ReleaseMutex
ResumeThread
TerminateProcess
CreateFileA
CloseHandle
DeviceIoControl
VirtualAlloc
SetFilePointer
ReadFile
VirtualFree
CreateMutexA
WriteFile
user32
TranslateMessage
GetMessageA
CreateWindowExA
RegisterClassExA
PostMessageA
GetWindowThreadProcessId
EnumWindows
MessageBeep
DispatchMessageA
GetWindowTextA
IsWindow
DestroyWindow
RegisterClassA
PostThreadMessageA
MsgWaitForMultipleObjects
PeekMessageA
PostQuitMessage
DefWindowProcA
SetTimer
GetForegroundWindow
wsprintfA
gdi32
GetStockObject
advapi32
LookupPrivilegeValueA
RegCloseKey
RegOpenKeyExA
RegCreateKeyA
RegDeleteKeyA
RegSetValueExA
GetUserNameA
RegQueryValueExA
RegOpenKeyA
CryptReleaseContext
CryptEncrypt
CryptDestroyHash
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptDestroyKey
CryptExportKey
CryptGetUserKey
CryptGenKey
CryptAcquireContextA
AdjustTokenPrivileges
OpenProcessToken
shell32
StrRChrA
StrStrIA
SHGetSpecialFolderPathA
StrCmpNIA
ole32
CoCreateInstance
CoInitialize
mfc42
ord924
ord5683
ord5710
ord825
ord823
ord561
ord815
ord800
ord2818
ord540
ord537
ord860
ord1575
ord539
ord939
ord941
ord535
ord3584
ord543
ord803
ord6307
ord521
ord858
ord3701
ord500
ord772
ord1105
ord6142
ord2393
ord5860
ord663
ord348
ord1187
msvcrt
_beginthreadex
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
_mbsicmp
_mbsrchr
_mbstok
strncmp
sprintf
strncat
strncpy
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
__CxxFrameHandler
_CxxThrowException
strstr
_mbsstr
mktime
difftime
_ftol
time
free
fclose
fread
fwrite
malloc
fopen
_strdup
_purecall
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??0out_of_range@std@@QAE@ABV01@@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0logic_error@std@@QAE@ABV01@@Z
??_7out_of_range@std@@6B@
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1out_of_range@std@@UAE@XZ
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ