Static task
static1
Behavioral task
behavioral1
Sample
c377fdcf9f0d884cabad4fb1199d57ff.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c377fdcf9f0d884cabad4fb1199d57ff.exe
Resource
win10v2004-20221111-en
General
-
Target
c377fdcf9f0d884cabad4fb1199d57ff.exe
-
Size
717KB
-
MD5
c377fdcf9f0d884cabad4fb1199d57ff
-
SHA1
e9ef68bc310f66d191723a7c05bd27d07e137fca
-
SHA256
97a1699cdcc0f5620e224c3269da0909acbf769b84cc8b3696fb2f68b1cd5bdf
-
SHA512
0b5dd28c3642d7a83bd441c3a5ed9d3478517ef72e803321d97f1d3ec17dd31db5f521cf94394af1acaa58ac3c058fb5f18be12f11c7e12356da6ea74ebd505a
-
SSDEEP
12288:LXcqhWkdzkMWzcw9OsOSsyRvy1u7kqtf2ssp2JcPpHL4JiV8qGV3wGa7Y8vh4HZI:LXc/SzGzc8OsO9yRvlD2ssp2eRHksiG5
Malware Config
Signatures
Files
-
c377fdcf9f0d884cabad4fb1199d57ff.exe.exe windows x86
9fdf9ab4488734a1a0f7e4bcd2d39ea4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
FreeEnvironmentStringsA
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
IsValidLocale
GetEnvironmentStrings
EnumSystemLocalesA
CompareStringA
GetLocaleInfoA
CompareStringW
GetUserDefaultLCID
HeapSize
CloseHandle
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
SetEnvironmentVariableA
CreateFileA
ReadConsoleInputA
SetConsoleMode
CreateProcessA
VirtualProtect
GetConsoleCP
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetModuleFileNameA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
GetProcAddress
ExitProcess
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
HeapAlloc
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetFileAttributesA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetStdHandle
comdlg32
PrintDlgW
PrintDlgExW
PrintDlgA
PageSetupDlgW
CommDlgExtendedError
GetFileTitleW
FindTextW
mpr
WNetGetNetworkInformationW
WNetConnectionDialog1W
MultinetGetConnectionPerformanceW
MultinetGetConnectionPerformanceA
WNetDisconnectDialog1A
WNetOpenEnumW
WNetGetConnectionA
WNetConnectionDialog
WNetAddConnectionW
ole32
HWND_UserFree
FreePropVariantArray
WriteOleStg
StgOpenStorageEx
UtConvertDvtd32toDvtd16
HENHMETAFILE_UserSize
OleLoad
msvfw32
ICGetInfo
ICSendMessage
GetOpenFileNamePreviewA
avifil32
AVIStreamRead
AVIStreamCreate
shlwapi
PathCreateFromUrlW
UrlIsNoHistoryA
StrRChrW
PathMakePrettyA
SHEnumKeyExW
UrlHashW
SHRegCreateUSKeyA
StrChrA
gdi32
CreateCompatibleBitmap
GetClipRgn
GetTextCharacterExtra
BitBlt
CreateDIBSection
CreateFontIndirectW
EudcLoadLinkW
odbc32
VRetrieveDriverErrorsRowCol
ord160
ord30
ord64
ord217
PostComponentError
ord142
CursorLibLockStmt
ord270
ord136
msacm32
acmDriverRemove
acmDriverClose
acmFormatDetailsA
acmDriverEnum
acmFilterChooseW
acmStreamOpen
acmDriverAddA
acmStreamUnprepareHeader
user32
CallWindowProcW
Sections
.code Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 569KB - Virtual size: 569KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.l2 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l2 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ