Static task
static1
Behavioral task
behavioral1
Sample
f003d943b627697656dac7a2cec94d857b4eff76308cf5562db7b8f3a4338fc5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f003d943b627697656dac7a2cec94d857b4eff76308cf5562db7b8f3a4338fc5.exe
Resource
win10v2004-20220812-en
General
-
Target
f003d943b627697656dac7a2cec94d857b4eff76308cf5562db7b8f3a4338fc5
-
Size
280KB
-
MD5
1299ddf095b001e22e5551e7c31f2ebb
-
SHA1
87422fe4a146798c15a7d35680000c9fc43513a9
-
SHA256
f003d943b627697656dac7a2cec94d857b4eff76308cf5562db7b8f3a4338fc5
-
SHA512
90e643d571f8ca4f2cbb2443da0c146cb5fed72bc46ec59e3b1b9691376c63bb73cc63ea8fc48b58c21d759e79e3bce298eafbd91e32bb9a2ced46735ec1500d
-
SSDEEP
6144:QsBgwGsDJrVLbmuEUjJgRBZVUkhqyS4fspR:XgaJr5bPKB7Ukhqbosp
Malware Config
Signatures
Files
-
f003d943b627697656dac7a2cec94d857b4eff76308cf5562db7b8f3a4338fc5.exe windows x86
9b1bd2e475d9b74947c84dccf9fb7342
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationA
SHGetFileInfoA
SHEmptyRecycleBinW
DragFinish
SHQueryRecycleBinW
ExtractAssociatedIconExA
SHGetSpecialFolderPathW
SheChangeDirExW
SHGetInstanceExplorer
SHFreeNameMappings
SHGetSpecialFolderPathA
SHBrowseForFolder
CheckEscapesW
SHFileOperationW
RealShellExecuteExW
FindExecutableA
DragAcceptFiles
DuplicateIcon
advapi32
GetUserNameA
RegLoadKeyA
LookupSecurityDescriptorPartsA
LookupAccountSidW
CryptDuplicateHash
CryptGetProvParam
CryptEnumProviderTypesW
RegEnumKeyExA
GetUserNameW
CryptSetProviderExA
LogonUserW
RegSetValueExA
CryptEnumProvidersW
DuplicateToken
RegSetKeySecurity
CryptHashSessionKey
CryptEncrypt
user32
GetPropA
SetScrollRange
DestroyWindow
GetClassNameA
gdi32
PolyBezierTo
Rectangle
GetEnhMetaFileDescriptionA
CreateMetaFileW
PtVisible
GetOutlineTextMetricsA
GetCharWidthFloatA
TranslateCharsetInfo
CreateCompatibleBitmap
GdiPlayJournal
GdiFlush
AnimatePalette
CopyEnhMetaFileW
ExtEscape
GetMetaFileA
CreateHatchBrush
kernel32
GetVersionExA
GetCurrentProcessId
GetEnvironmentStringsW
SetLastError
TlsSetValue
QueryPerformanceCounter
GetCPInfo
GetStdHandle
WriteConsoleOutputCharacterA
GetCommandLineA
CreateThread
LCMapStringW
GetCommandLineW
GlobalFindAtomA
LeaveCriticalSection
HeapSize
GetTickCount
GetTimeFormatA
WriteFile
FillConsoleOutputCharacterA
TlsGetValue
HeapReAlloc
SetConsoleWindowInfo
InterlockedExchange
MultiByteToWideChar
GetModuleHandleA
IsValidLocale
SetHandleCount
SetEnvironmentVariableA
CompareStringW
GetFileSize
EnumResourceTypesW
FreeEnvironmentStringsA
GetCurrentThread
TlsFree
GetFileType
GetSystemTimeAsFileTime
GetProcAddress
InitializeCriticalSection
HeapAlloc
GetStringTypeW
GetOEMCP
GetModuleFileNameA
GetStringTypeA
GetLongPathNameW
GetNumberFormatA
Sleep
HeapFree
IsBadWritePtr
GetStartupInfoA
EnumDateFormatsA
lstrcat
HeapDestroy
TerminateProcess
CreateDirectoryExW
GetCurrentProcess
VirtualQuery
GetUserDefaultLCID
MoveFileExA
IsValidCodePage
GetFileAttributesA
FileTimeToDosDateTime
DeleteCriticalSection
TlsAlloc
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
SetThreadPriority
VirtualAlloc
GetTimeZoneInformation
FreeLibrary
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetLocaleInfoW
GetDateFormatA
GetLastError
CompareStringA
GetProcessHeaps
ExitProcess
GetLocaleInfoA
EnumSystemLocalesA
LCMapStringA
IsDebuggerPresent
RtlUnwind
SetConsoleCtrlHandler
ExitThread
GetEnvironmentStringsA
GetProcessHeap
VirtualFree
GetACP
GetStartupInfoW
GlobalReAlloc
WideCharToMultiByte
EnterCriticalSection
GetEnvironmentStrings
SetUnhandledExceptionFilter
HeapCreate
GetModuleFileNameW
LoadLibraryA
GlobalUnfix
wininet
IsUrlCacheEntryExpiredW
InternetGoOnline
InternetOpenA
InternetSetOptionA
DetectAutoProxyUrl
IsHostInProxyBypassList
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ