Static task
static1
Behavioral task
behavioral1
Sample
00ddba492ec2ac7df8bce0acd0b784a4d1be76bdd3b62aea792b0df95b102855.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
00ddba492ec2ac7df8bce0acd0b784a4d1be76bdd3b62aea792b0df95b102855.exe
Resource
win10v2004-20220414-en
General
-
Target
00ddba492ec2ac7df8bce0acd0b784a4d1be76bdd3b62aea792b0df95b102855
-
Size
573KB
-
MD5
156603f5047a0b18d8b8762fb98b16b0
-
SHA1
5ab23ca80741d0afb620a9947d73f313c9254736
-
SHA256
00ddba492ec2ac7df8bce0acd0b784a4d1be76bdd3b62aea792b0df95b102855
-
SHA512
1e4ddeaf82a9ccb6455c5b84fc4b82f67562e5fc7029e40e89ff5ea993b7a03b69492a8be95e4a2c92bde83db931d2bb2af480491a549b4484b387e3444195dd
-
SSDEEP
12288:evpeVgKz80szNTUkBlNM2Wzr1zd60sXy+4G//8boZ/KztX0SqK:eB6vwLTUkBM2eLsXy+4GMbW/CtXN
Malware Config
Signatures
Files
-
00ddba492ec2ac7df8bce0acd0b784a4d1be76bdd3b62aea792b0df95b102855.exe windows x86
e787f869c13191704ddc87c560e41ba8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
kernel32
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
GetProcAddress
FreeLibrary
CreateMutexW
GetLastError
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
GetLogicalDriveStringsW
GetModuleFileNameW
Process32FirstW
Process32NextW
SetStdHandle
GetModuleHandleW
GetSystemInfo
GetVersionExW
CreateFileW
DeviceIoControl
InterlockedDecrement
LocalFree
lstrlenA
SetEndOfFile
HeapReAlloc
FlushFileBuffers
GetOEMCP
CreateToolhelp32Snapshot
SetUnhandledExceptionFilter
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStringTypeW
HeapFree
GetCommandLineW
ReadFile
HeapAlloc
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
RaiseException
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
IsValidCodePage
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
GetStdHandle
GetFileType
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
GetConsoleCP
GetConsoleMode
ReadConsoleW
GetACP
WriteConsoleW
user32
GetSystemMetrics
FindWindowW
FindWindowExW
SendMessageW
oleaut32
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ