Behavioral task
behavioral1
Sample
5de47f786534c1fbe8173ac71ab48602fe3462baed77eea70f2b59231ffa69c0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5de47f786534c1fbe8173ac71ab48602fe3462baed77eea70f2b59231ffa69c0.exe
Resource
win10-en-20211208
General
-
Target
5de47f786534c1fbe8173ac71ab48602fe3462baed77eea70f2b59231ffa69c0
-
Size
162KB
-
MD5
ab64b81540af03005987307b784da30b
-
SHA1
24d4bbc982a6a561f0426a683b9617de1a96a74a
-
SHA256
5de47f786534c1fbe8173ac71ab48602fe3462baed77eea70f2b59231ffa69c0
-
SHA512
ff61a5a57d38a646aa19a8b5d79392d355dfbf9993990f34a270cd2d3c26755dc8e739bf1cfcd41423ad62504d9df4f15ef64190528eb3305bd7a847bd68541c
-
SSDEEP
3072:A4MyblJ8cHbH1lPbAL0sAvIsmvNg+7N/K+qOlgqxt8Uyt4K6+BliT4:DB3pHrS0fvIsCg+A+qO3RK7Y4
Malware Config
Signatures
Files
-
5de47f786534c1fbe8173ac71ab48602fe3462baed77eea70f2b59231ffa69c0.exe windows x86
9e136c65a8ad6fe24b32fb40d427b719
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoTaskMemFree
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
shell32
SHGetKnownFolderPath
advapi32
GetNamedSecurityInfoA
SetEntriesInAclA
SetSecurityDescriptorGroup
SetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
SetNamedSecurityInfoA
ws2_32
WSAGetLastError
getaddrinfo
htonl
rpcrt4
UuidCreate
winhttp
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpConnect
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpOpen
kernel32
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
SetStdHandle
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
DecodePointer
WriteConsoleW
FreeEnvironmentStringsW
SetUnhandledExceptionFilter
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
LCMapStringW
GetStringTypeW
FreeLibrary
GetProcAddress
GetLastError
GetTickCount
LoadLibraryA
GetComputerNameExW
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InterlockedDecrement
LocalFree
WriteFile
ReadFile
GetLocalTime
GetModuleFileNameA
GetSystemWindowsDirectoryW
Sleep
CloseHandle
GetTickCount64
CreateProcessW
GetSystemWindowsDirectoryA
CreateFileA
MultiByteToWideChar
UnhandledExceptionFilter
CreateFileW
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RaiseException
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
SetLastError
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
GetACP
GetFileType
Sections
.text Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ