Static task
static1
Behavioral task
behavioral1
Sample
c77b76a467c47449d56624b2ddbf18442d105429d15810e26de1152f63098623.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c77b76a467c47449d56624b2ddbf18442d105429d15810e26de1152f63098623.exe
Resource
win10v2004-20230220-en
General
-
Target
c77b76a467c47449d56624b2ddbf18442d105429d15810e26de1152f63098623
-
Size
2.5MB
-
MD5
50e09a90ea9893e525046b51647b7e17
-
SHA1
f895e2d14ca94c8fca6fdcebaccbaf561004a2fb
-
SHA256
c77b76a467c47449d56624b2ddbf18442d105429d15810e26de1152f63098623
-
SHA512
d07ba3cafead04bfb9bbca8c135d7459630d7e38ed2f258257a3f4bbf2d3ffb98b704fefe28fb0e62f613c3b173dc107242354c21c3e9a5fde7688c99a21b6d6
-
SSDEEP
49152:O1yGNEA/00uft3xMR9e3tBO1Aa8WPpPwwygUDshrGOrbDE:O1yTAc0uft3uRQKGwyb4h
Malware Config
Signatures
Files
-
c77b76a467c47449d56624b2ddbf18442d105429d15810e26de1152f63098623.exe windows x86
299867454b9c3051aefd63c416a60cae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
GetLastError
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetLocalTime
OpenProcess
CreateEventW
Sleep
WaitForSingleObject
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetFullPathNameW
GetCurrentDirectoryW
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
SystemTimeToFileTime
GetSystemTime
GetVersionExW
lstrcmpiW
GetSystemDirectoryW
GetSystemWindowsDirectoryW
CopyFileW
MoveFileExW
DeviceIoControl
CreateFileW
LocalAlloc
LocalFree
GetCurrentProcess
GetModuleFileNameW
OutputDebugStringW
ResetEvent
WaitForSingleObjectEx
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetPrivateProfileIntW
GetExitCodeProcess
CreateProcessW
DeleteFileA
GetFileSize
WriteFile
ReadFile
GetTempPathW
GetFileAttributesW
DeleteFileW
GetTickCount
DecodePointer
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentVariableW
CreateDirectoryW
FileTimeToSystemTime
GetSystemInfo
GlobalAlloc
GlobalFree
ProcessIdToSessionId
GetVolumeInformationW
OutputDebugStringA
SetPriorityClass
EncodePointer
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
SetStdHandle
GetConsoleCP
FlushFileBuffers
WriteConsoleW
SetEndOfFile
ReadConsoleA
SetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
ExpandEnvironmentStringsA
PeekNamedPipe
WaitForMultipleObjects
SleepEx
FormatMessageA
TerminateThread
CreateThread
FindNextFileW
FindFirstFileW
LoadLibraryW
lstrcpyW
FindClose
GetLongPathNameW
CloseHandle
IsBadReadPtr
LoadLibraryA
lstrlenW
GetNativeSystemInfo
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
VirtualProtect
VirtualFree
VirtualAlloc
GetProcAddress
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
RaiseException
advapi32
CryptGenRandom
CryptReleaseContext
ImpersonateLoggedOnUser
RevertToSelf
RegCreateKeyExW
DuplicateTokenEx
LookupPrivilegeValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
RegDeleteKeyW
LookupAccountSidW
GetTokenInformation
StartServiceW
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
RegSetValueExW
RegCloseKey
RegEnumKeyW
RegOpenKeyW
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
CreateProcessAsUserW
CryptAcquireContextW
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
shell32
SHChangeNotify
SHGetFolderPathW
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
shlwapi
PathFileExistsW
SHGetValueW
SHSetValueW
StrStrIW
PathAppendW
SHDeleteKeyW
SHDeleteValueW
wtsapi32
WTSQueryUserToken
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
wsprintfW
LoadStringW
psapi
GetProcessImageFileNameW
EnumProcesses
wininet
HttpQueryInfoW
InternetQueryOptionW
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetOpenUrlW
InternetReadFile
wldap32
ord143
ord46
ord211
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ws2_32
gethostname
ioctlsocket
listen
accept
sendto
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
WSAStartup
WSACleanup
closesocket
bind
recv
WSAGetLastError
__WSAFDIsSet
select
WSASetLastError
send
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 537KB - Virtual size: 536KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ