Static task
static1
Behavioral task
behavioral1
Sample
01492b9561427c80e1c85335c4473d592089e71097beaa352977a3510e4dd8d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01492b9561427c80e1c85335c4473d592089e71097beaa352977a3510e4dd8d1.exe
Resource
win10v2004-20220901-en
General
-
Target
01492b9561427c80e1c85335c4473d592089e71097beaa352977a3510e4dd8d1
-
Size
196KB
-
MD5
85a6430d4cc2419acc6e196f5d21f8b1
-
SHA1
026b7036375871638b41b9da0ae2dc48f60d0407
-
SHA256
01492b9561427c80e1c85335c4473d592089e71097beaa352977a3510e4dd8d1
-
SHA512
805617cf355e3593abdea253cd04d12414fb52840f7a6bfcd45a7dfd30e1c5464ead4ae65f2d3f15d9e740ebeb26a9b27395baf4f7ddd7a8b676cdbd52f37087
-
SSDEEP
3072:IwXPBT/U4ut20zzsBcw8W+qGEVXEBidxBr1WL1WVgJzC2JmJ/NlvDzm:IArUcveEVXtxBR2WiGnDzm
Malware Config
Signatures
Files
-
01492b9561427c80e1c85335c4473d592089e71097beaa352977a3510e4dd8d1.exe windows x86
ab8dcdd0ce0fa6db4ae2b4925562c5b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
userenv
GetUserProfileDirectoryA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetLocaleInfoW
SetEndOfFile
GetLastError
CloseHandle
ReadFile
CreateFileA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
InterlockedDecrement
SetFileAttributesA
Process32Next
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
FindNextFileA
FindFirstFileA
SetCurrentDirectoryA
GetModuleFileNameA
Sleep
GetVersion
WinExec
WriteFile
GetTempPathA
InterlockedIncrement
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
GetCurrentProcess
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
SetStdHandle
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
LCMapStringW
LCMapStringA
SetFilePointer
FlushFileBuffers
GetCurrentProcessId
GetTickCount
LocalFree
VirtualQuery
GetStartupInfoA
GetSystemInfo
GetCommandLineA
CopyFileA
QueryPerformanceCounter
IsBadWritePtr
VirtualFree
HeapCreate
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetLastError
VirtualAlloc
VirtualProtect
GetModuleHandleA
GetProcAddress
RemoveDirectoryA
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
LeaveCriticalSection
TlsAlloc
SetUnhandledExceptionFilter
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EnterCriticalSection
user32
wsprintfA
SetTimer
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
BeginPaint
EndPaint
PostQuitMessage
EndDialog
comdlg32
GetFileTitleA
advapi32
RegQueryValueExA
OpenProcessToken
RegCreateKeyA
RegSetValueExA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetDesktopFolder
ShellExecuteA
SHGetMalloc
ole32
CoInitialize
CoCreateInstance
StringFromGUID2
CoCreateGuid
oleaut32
SysAllocStringLen
VariantClear
VariantInit
VariantCopy
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SysAllocString
GetErrorInfo
shlwapi
PathFileExistsA
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ