Static task
static1
Behavioral task
behavioral1
Sample
e7c4747a294db8a679c5b44c5ecb3bca39f796f92b02061627a02d2afe0df855.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7c4747a294db8a679c5b44c5ecb3bca39f796f92b02061627a02d2afe0df855.exe
Resource
win10v2004-20221111-en
General
-
Target
e7c4747a294db8a679c5b44c5ecb3bca39f796f92b02061627a02d2afe0df855
-
Size
320KB
-
MD5
2f84ba8d7a12a56e688f1fc852c485b2
-
SHA1
0128ee7ff4b6812ffda55d735ed6fb3983e1eea2
-
SHA256
e7c4747a294db8a679c5b44c5ecb3bca39f796f92b02061627a02d2afe0df855
-
SHA512
0206780000420113033c2c12192257ad1d9b9ac7f8786ca9e45d5a316b98652097895c5d4aed4cce5f36d2ff28c1a2ecef946cb085a0a71748ff9a4cf7ee088d
-
SSDEEP
6144:wlDO3wlpJUYsx4n39m6Lx2Dg/r6sTkoqNW5bZ7oSRXkW:wll3sENmsqg/O4xqNaeok
Malware Config
Signatures
Files
-
e7c4747a294db8a679c5b44c5ecb3bca39f796f92b02061627a02d2afe0df855.exe windows x86
a76c3bcdadc369721d82f87e0c2f48d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileExW
CreateDirectoryW
CreateEventW
CreateFileA
CreateFileMappingW
CreateFileW
CreateThread
DeleteCriticalSection
DeleteFileW
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindCloseChangeNotification
FindFirstFileW
FindNextChangeNotification
FindNextFileW
FlushFileBuffers
FlushViewOfFile
FormatMessageW
FreeLibrary
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetFileAttributesW
GetFileSize
GetLastError
GetModuleFileNameW
GetPrivateProfileStringW
GetProcAddress
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
GlobalMemoryStatus
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LoadLibraryW
LocalFree
MapViewOfFile
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
ReplaceFileW
ResetEvent
SetEnvironmentVariableW
SetEvent
SetFileAttributesW
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
lstrlenA
GetVersionExW
CloseHandle
ole32
CoCreateInstance
StringFromGUID2
IIDFromString
CoUninitialize
CoInitializeEx
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
BSTR_UserFree
BSTR_UserMarshal
BSTR_UserSize
BSTR_UserUnmarshal
LPSAFEARRAY_UserFree
LPSAFEARRAY_UserMarshal
LPSAFEARRAY_UserSize
LPSAFEARRAY_UserUnmarshal
rpcrt4
UuidFromStringW
UuidCreate
RpcStringFreeW
RpcStringFreeA
RpcServerUseProtseqW
RpcServerUseProtseqEpW
RpcServerRegisterIfEx
RpcServerRegisterIf2
RpcServerListen
RpcServerInqDefaultPrincNameW
RpcServerInqBindings
RpcRaiseException
RpcMgmtSetCancelTimeout
RpcBindingToStringBindingA
I_RpcServerUseProtseq2W
I_RpcBindingIsClientLocal
I_RpcBindingInqTransportType
RpcEpRegisterA
user32
TranslateMessage
CreateWindowExW
RegisterClassW
LoadStringW
LoadIconW
LoadCursorW
GetMessageW
DispatchMessageW
DefWindowProcW
CharLowerW
wsock32
listen
recvfrom
select
sendto
setsockopt
socket
ord1141
ord1142
WSAAsyncSelect
WSAGetLastError
WSAStartup
bind
closesocket
gethostbyname
gethostname
getsockopt
htons
ioctlsocket
inet_addr
ws2_32
WSAAccept
WSAConnect
WSAEnumProtocolsW
WSASocketW
WSASend
WSARecv
WSALookupServiceNextW
WSALookupServiceEnd
WSALookupServiceBeginW
WSAIoctl
crypt32
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateChain
CertFreeCertificateContext
CertGetCertificateChain
CertOpenStore
CertVerifyCertificateChainPolicy
gdi32
GetStockObject
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ