Static task
static1
Behavioral task
behavioral1
Sample
d46acd2c58140520c1073b2e46f4b000f5153bdef32027b56304df6fe7bd559e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d46acd2c58140520c1073b2e46f4b000f5153bdef32027b56304df6fe7bd559e.exe
Resource
win10v2004-20220901-en
General
-
Target
d46acd2c58140520c1073b2e46f4b000f5153bdef32027b56304df6fe7bd559e
-
Size
88KB
-
MD5
0a9aeebc5f9b7c79aa7c6aeade4b2cff
-
SHA1
48d83a660a431b9cacb30709305548bbf9cb81f7
-
SHA256
d46acd2c58140520c1073b2e46f4b000f5153bdef32027b56304df6fe7bd559e
-
SHA512
41c7f7e3250d3add0590f490f94689955a4d89cc90fe95d9ead1b16b669efb0fe5d41880f3651eff57030691eb4be1e6c532145a70ce55edba448cae96c2551c
-
SSDEEP
1536:ZSigqCZ30nKGZKfDRwrxmnDzJZjnIvNk56tOEJuYs+uyeY:YigfZ4aMxY2O6kEJuYsnye
Malware Config
Signatures
Files
-
d46acd2c58140520c1073b2e46f4b000f5153bdef32027b56304df6fe7bd559e.exe windows x86
f52a3f9a247060eed0beaa32f238b910
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
CreateFileA
SetFilePointer
ReadFile
WriteFile
GetModuleFileNameW
CreateFileW
GetFileSize
GetVolumeInformationW
lstrcatW
CreateMutexW
GetLastError
WaitForSingleObject
GetModuleFileNameA
lstrcatA
OpenProcess
lstrcpyA
CloseHandle
GetCurrentProcess
MoveFileExW
InterlockedDecrement
FlushFileBuffers
GetStringTypeW
LCMapStringW
WriteConsoleW
SetStdHandle
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
LoadLibraryW
EnterCriticalSection
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
LocalFree
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
EncodePointer
DecodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
IsProcessorFeaturePresent
GetProcAddress
GetModuleHandleW
ExitProcess
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
Sleep
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LeaveCriticalSection
user32
LoadStringA
wsprintfA
advapi32
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CLSIDFromProgID
oleaut32
SysAllocString
GetErrorInfo
SysAllocStringByteLen
VariantClear
VariantCopy
VariantInit
SysFreeString
SysStringByteLen
psapi
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
urlmon
URLDownloadToFileA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ