Static task
static1
Behavioral task
behavioral1
Sample
c7318784250a9ff9934103a41718419095229f30c50044c27aad3d43a2e53642.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7318784250a9ff9934103a41718419095229f30c50044c27aad3d43a2e53642.exe
Resource
win10v2004-20220812-en
General
-
Target
c7318784250a9ff9934103a41718419095229f30c50044c27aad3d43a2e53642
-
Size
968KB
-
MD5
34c3fe425b0abada64d2e4f78943c676
-
SHA1
2b50be4ef66e96d707e4beefafa3ff72fbeb8dba
-
SHA256
c7318784250a9ff9934103a41718419095229f30c50044c27aad3d43a2e53642
-
SHA512
ae4811a296ba390431f667bcc96b6616b777e17d82e3fce796ffa869fa717e784fb92cb0aeebfa7bf5fcb771cb8492ecbb0fbe5df5f4a855a0d6f3f032a43302
-
SSDEEP
6144:niL6BO61LkT8f2BYjO1isXiCwT+ecRyKcZHSThSZrs+dbt0:n6mO4LkTpE4waReZyT0K+
Malware Config
Signatures
Files
-
c7318784250a9ff9934103a41718419095229f30c50044c27aad3d43a2e53642.exe windows x86
c071c8f2b269ff93149ac73018a7c812
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetComputerNameA
GetACP
OpenProcess
ReleaseMutex
CreateMutexA
FlushFileBuffers
lstrcmpiA
CreateProcessA
TerminateProcess
RemoveDirectoryA
DeviceIoControl
GetVersionExA
LocalFree
FormatMessageA
GetWindowsDirectoryA
GetShortPathNameA
CreateDirectoryA
GetCurrentProcess
GetFullPathNameA
CompareStringW
CompareStringA
SetStdHandle
SetFileAttributesA
GetFileType
GetStdHandle
SetHandleCount
GetLocalTime
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
VirtualAlloc
VirtualFree
GetEnvironmentVariableA
HeapSize
HeapReAlloc
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
SetLastError
TlsAlloc
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
GetSystemTimeAsFileTime
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitThread
TlsGetValue
TlsSetValue
CreateThread
RtlUnwind
LeaveCriticalSection
SetEnvironmentVariableA
EnterCriticalSection
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLastError
GetFileAttributesA
CopyFileA
TerminateThread
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
Sleep
GetVolumeInformationA
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
IsBadReadPtr
IsBadWritePtr
lstrlenA
InterlockedDecrement
InterlockedIncrement
CreateEventA
SetEvent
GetSystemTime
GetFileTime
SetFileTime
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
GetEnvironmentStringsW
ResumeThread
FreeLibrary
WaitForSingleObject
LoadLibraryA
GetProcAddress
MoveFileA
DeleteFileA
GetVersion
GetSystemDirectoryA
WriteFile
CreateFileA
ReadFile
SetFilePointer
CloseHandle
GetTickCount
IsBadCodePtr
VirtualProtect
user32
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
GetCursorPos
ReleaseDC
wsprintfA
PostThreadMessageA
GetForegroundWindow
ExitWindowsEx
GetSystemMetrics
EndDialog
CreateDialogParamA
UpdateWindow
ShowWindow
IsWindow
PostQuitMessage
SetCursor
MessageBoxA
LoadStringA
GetPropA
SetPropA
DefWindowProcA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
PostMessageA
UnregisterClassA
GetDC
gdi32
GetStockObject
GetDeviceCaps
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
RegEnumKeyExA
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
DeregisterEventSource
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegCreateKeyA
CreateServiceA
DeleteService
StartServiceCtrlDispatcherA
StartServiceA
QueryServiceStatus
ControlService
RegisterServiceCtrlHandlerA
SetServiceStatus
ReportEventA
RegisterEventSourceA
InitiateSystemShutdownA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegConnectRegistryA
RegQueryValueExA
ole32
CoTaskMemFree
CoCreateInstance
StringFromCLSID
CoInitializeEx
CoInitialize
CoUninitialize
oleaut32
SysAllocStringLen
SysAllocString
SysFreeString
Sections
.text Size: 240KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 656KB - Virtual size: 654KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ