Static task
static1
Behavioral task
behavioral1
Sample
7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe
Resource
win10v2004-20220812-en
General
-
Target
7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6
-
Size
143KB
-
MD5
6307838a9cef952321a44cc3e189213e
-
SHA1
2b3fea431f342c7b8bcff4b89715002e44d662c7
-
SHA256
7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6
-
SHA512
3b31e14fdfa6ecd33a0086b3db84ac1b0fef97a40cb82115007c69680e201c22bb638af4a4255dd21a2219e1143f1c940b4308d618467d9f0f22b0bab40cf18d
-
SSDEEP
1536:4uFohxL86e7tnkZXYklWXuiMqeGKPPRxPv8/0JS1CjhSlUUbvF7kFrWyaBvEEUAX:4RhxktIWTMqPKPPH1yUUB4kVUXsB/
Malware Config
Signatures
Files
-
7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe windows x64
3d44d5c3a9babeacb463c4330a21f7cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
kernel32
CloseHandle
CopyFileW
CreateFileW
CreateIoCompletionPort
CreateThread
DeleteCriticalSection
EnterCriticalSection
FindClose
FindFirstFileW
FindFirstVolumeW
FindNextFileW
FindNextVolumeW
FindVolumeClose
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDriveTypeW
GetEnvironmentVariableW
GetFileSizeEx
GetLastError
GetLogicalDrives
GetModuleFileNameW
GetProcessHeap
GetQueuedCompletionStatus
GetStartupInfoA
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVolumePathNamesForVolumeNameW
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LocalFree
MoveFileExW
MoveFileW
PostQueuedCompletionStatus
QueryDosDeviceW
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetEndOfFile
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetPriorityClass
SetThreadPriority
SetUnhandledExceptionFilter
SetVolumeMountPointW
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WriteFile
lstrcatW
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
msvcrt
__C_specific_handler
__getmainargs
__initenv
__iob_func
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_exit
_fmode
_initterm
_onexit
_snwprintf
abort
bsearch
calloc
exit
fprintf
free
fwprintf
fwrite
malloc
mbstowcs
memcpy
memmove
memset
printf
puts
qsort
raise
realloc
signal
sprintf
strcpy
strlen
strncmp
vfprintf
wcscpy
shell32
CommandLineToArgvW
SHChangeNotify
ShellExecuteExW
user32
MessageBoxW
rstrtmgr
RmEndSession
RmGetList
RmRegisterResources
RmShutdown
RmStartSession
shlwapi
PathFindExtensionW
ws2_32
htons
ntohs
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 15KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE