Static task
static1
Behavioral task
behavioral1
Sample
27ae5cc7fc4c237e807e1fde4b9d7f4479278d4886cea4bb7abe15c4f533eff1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
27ae5cc7fc4c237e807e1fde4b9d7f4479278d4886cea4bb7abe15c4f533eff1.exe
Resource
win10v2004-20220414-en
General
-
Target
27ae5cc7fc4c237e807e1fde4b9d7f4479278d4886cea4bb7abe15c4f533eff1
-
Size
133KB
-
MD5
10b32b96f5a972db48a0681e7aa344d7
-
SHA1
5d9bb1f7318f6e00933384239fba223bdb5f4edb
-
SHA256
27ae5cc7fc4c237e807e1fde4b9d7f4479278d4886cea4bb7abe15c4f533eff1
-
SHA512
d9ac26b7a069da2f2e9a6094908763b2b801acf7648cf5243eaf848e32d063215db27ee927904abd7efc0fcf349d1deae05404e359921a6dca6ce791fb0a700e
-
SSDEEP
1536:y+D0PFFbLPrj7wcomL0sjlUXjdLUpy8sejiLFX7UUonyBXD2WfhS+2/d:yvPvPP7wzmLBp/jUpRXD2WfhS+md
Malware Config
Signatures
Files
-
27ae5cc7fc4c237e807e1fde4b9d7f4479278d4886cea4bb7abe15c4f533eff1.exe windows x86
6abfae5a09a33cade562fccb55b40cb4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
DeleteFileA
CreateRemoteThread
VirtualAllocEx
OpenMutexA
CreateMutexA
WriteProcessMemory
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetTickCount
VirtualQueryEx
ReadProcessMemory
CloseHandle
GetProcessId
CreateThread
GetCurrentProcess
IsWow64Process
GetFileSize
CallNamedPipeA
WaitNamedPipeA
ConnectNamedPipe
WriteFile
TerminateThread
ReadFile
DisconnectNamedPipe
CreateNamedPipeA
CreateToolhelp32Snapshot
GetModuleFileNameA
Process32Next
CopyFileA
GetLastError
CreateDirectoryA
TerminateProcess
CreateProcessA
GetFileAttributesA
Sleep
GetVolumeInformationA
OpenProcess
Process32First
CreateFileA
SetThreadPriority
GetComputerNameA
GetProcessHeap
SetEndOfFile
GetStringTypeW
LCMapStringW
SetEnvironmentVariableA
CreateFileW
CompareStringW
HeapSize
FlushFileBuffers
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
RtlUnwind
MultiByteToWideChar
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
SetFilePointer
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetStdHandle
WriteConsoleW
advapi32
CheckTokenMembership
FreeSid
OpenSCManagerA
AllocateAndInitializeSid
StartServiceA
CreateServiceA
DeleteService
CloseServiceHandle
OpenServiceA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
ControlService
shell32
SHGetFolderPathA
SHGetSpecialFolderPathA
wininet
HttpSendRequestA
InternetCloseHandle
InternetConnectA
HttpQueryInfoA
HttpOpenRequestA
InternetOpenA
InternetReadFile
urlmon
URLDownloadToFileA
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE