Static task
static1
Behavioral task
behavioral1
Sample
24ea3abbad7882d88d61efc340a72823adc4076baa19ecd33e76a9e1174c28cd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
24ea3abbad7882d88d61efc340a72823adc4076baa19ecd33e76a9e1174c28cd.exe
Resource
win10v2004-20220812-en
General
-
Target
24ea3abbad7882d88d61efc340a72823adc4076baa19ecd33e76a9e1174c28cd
-
Size
109KB
-
MD5
fc374a4d26b3119157a6fae7a5873906
-
SHA1
a0abe740c49b3bd2452fdfba2bb5977de0f98de8
-
SHA256
24ea3abbad7882d88d61efc340a72823adc4076baa19ecd33e76a9e1174c28cd
-
SHA512
8e47c1fb163e1cb0bac8728056ba9487afa29d09e2443f84ad22739e6861f062e822cec53bc4fb847043e89b4b762d30910bf7beb27196d580ba09076c3515ed
-
SSDEEP
768:9BXDnonSjuMfvdW1lacva8hktqYhtgdZGgdfGgd:9lno2uMNAlacK8YzqZGqfGq
Malware Config
Signatures
Files
-
24ea3abbad7882d88d61efc340a72823adc4076baa19ecd33e76a9e1174c28cd.exe windows x86
f0eae37729a2a73161c1099c54e2e5e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
SetErrorMode
GetCommandLineA
CreateMutexA
GetLastError
HeapFree
CreateThread
HeapAlloc
ExitProcess
WriteFile
CloseHandle
CreateFileA
lstrlenA
SetFileTime
SetFilePointer
CopyFileA
GetFileTime
lstrcatA
Sleep
FreeLibrary
DeleteFileA
MoveFileExA
GetWindowsDirectoryA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetVersion
FindFirstFileA
FindNextFileA
FindClose
ReadFile
GetTickCount
lstrcpyA
GetComputerNameA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
shell32
ShellExecuteA
ws2_32
setsockopt
htons
send
inet_ntoa
ntohl
closesocket
recv
connect
htonl
bind
socket
WSAStartup
user32
wsprintfA
advapi32
ControlService
ChangeServiceConfigA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
shlwapi
SHSetValueA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE