Static task
static1
Behavioral task
behavioral1
Sample
66040816d69c2da579e35769a17732008127104cd2c23cfa60ee30684ae2a17b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
66040816d69c2da579e35769a17732008127104cd2c23cfa60ee30684ae2a17b.exe
Resource
win10v2004-20220812-en
General
-
Target
66040816d69c2da579e35769a17732008127104cd2c23cfa60ee30684ae2a17b
-
Size
60KB
-
MD5
b8732a0339bedfd1e87090537d74dec6
-
SHA1
860070aff47c1966603ac7cfae95162d04a01cae
-
SHA256
66040816d69c2da579e35769a17732008127104cd2c23cfa60ee30684ae2a17b
-
SHA512
0e023f96226c1d242dc9557b6f07c297be125a05bb8e4944edb76d0cc046e25dd2f9b738cb2d23644b0fc8d3b33aabe3b46a2224a05cd93440bf4007e78c9ed8
-
SSDEEP
1536:4hmQDNasLt+KVChfucy0/CjlXDneZMl1d:4Q4N3cy0Yneml1d
Malware Config
Signatures
Files
-
66040816d69c2da579e35769a17732008127104cd2c23cfa60ee30684ae2a17b.exe windows x86
da345dc251e148794f8cb4d464fd897a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
kernel32
SetStdHandle
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
CloseHandle
WriteFile
CreateFileA
GetModuleFileNameA
GetTempPathA
FlushFileBuffers
CopyFileA
DeleteFileA
SetCurrentDirectoryA
CreateDirectoryA
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetFilePointer
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
VirtualFree
HeapCreate
GetFileType
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
TerminateProcess
GetModuleHandleA
GetStringTypeW
GetStringTypeA
SetEndOfFile
WinExec
ReadFile
GetProcAddress
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
VirtualQuery
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetSystemInfo
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
user32
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
DispatchMessageA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
BeginPaint
EndPaint
PostQuitMessage
EndDialog
wsprintfA
TranslateMessage
comdlg32
GetFileTitleA
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyA
shell32
SHGetPathFromIDListA
ShellExecuteA
SHGetDesktopFolder
SHGetMalloc
ole32
CoCreateGuid
StringFromGUID2
shlwapi
PathFileExistsA
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE