Static task
static1
Behavioral task
behavioral1
Sample
20b4a22a790441163b1b448b0d8482a054b900798d9ddea90cc922f6a52305c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20b4a22a790441163b1b448b0d8482a054b900798d9ddea90cc922f6a52305c9.exe
Resource
win10v2004-20220812-en
General
-
Target
20b4a22a790441163b1b448b0d8482a054b900798d9ddea90cc922f6a52305c9
-
Size
114KB
-
MD5
21951487a134f001e940fcb4a84e5a14
-
SHA1
54c961c58cb274ca7027011dc6682702afafa482
-
SHA256
20b4a22a790441163b1b448b0d8482a054b900798d9ddea90cc922f6a52305c9
-
SHA512
abf45c040f19d5c9771761be1069c7e219657b12273c57bbd363a57c2f7b98f138e37f1f5269911e4199a84bc8ede19d36c96372eb72170b15db02ea7e386f4e
-
SSDEEP
3072:QxI6UVpm2u/1Dv2sn5L2yuFR6xoS8l+QW:QsXQ1j2sn5rvoS8l+QW
Malware Config
Signatures
Files
-
20b4a22a790441163b1b448b0d8482a054b900798d9ddea90cc922f6a52305c9.exe windows x86
226eda3e240942696b3e133912655f4f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
advapi32
AdjustTokenPrivileges
GetCurrentHwProfileA
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
kernel32
AddAtomA
BeginUpdateResourceA
CloseHandle
CopyFileA
CreateEventA
CreateFileA
CreateMutexA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
EndUpdateResourceA
ExitProcess
ExitThread
FindAtomA
FindResourceA
FreeLibrary
FreeResource
GetAtomNameA
GetCommandLineA
GetComputerNameA
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetTempPathA
GetTickCount
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
LoadResource
LockResource
Module32First
Module32Next
OpenProcess
Process32First
Process32Next
ReadProcessMemory
ReleaseSemaphore
SetEvent
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UpdateResourceA
VirtualProtect
VirtualProtectEx
VirtualQuery
WaitForSingleObject
WinExec
WriteFile
msvcrt
_itoa
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
atoi
calloc
ctime
exit
fclose
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
malloc
memchr
memcpy
memmove
printf
putchar
remove
signal
sprintf
strcat
strchr
strcmp
strcpy
strerror
strncpy
strstr
system
time
shell32
ShellExecuteA
user32
CallNextHookEx
DispatchMessageA
GetForegroundWindow
GetKeyState
GetKeyboardState
GetLastInputInfo
GetMessageA
GetWindowTextA
MapVirtualKeyA
MessageBoxA
SetWindowsHookExA
ToAscii
TranslateMessage
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
gethostname
htons
inet_addr
inet_ntoa
recv
send
socket
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 23KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ