Static task
static1
Behavioral task
behavioral1
Sample
003b1bb6ab590812e92a2e6013de7ead.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
003b1bb6ab590812e92a2e6013de7ead.exe
Resource
win10v2004-20220812-en
General
-
Target
003b1bb6ab590812e92a2e6013de7ead.exe
-
Size
209KB
-
MD5
003b1bb6ab590812e92a2e6013de7ead
-
SHA1
61ece935634977a3523489d1f0c7bd3d4e7b1f82
-
SHA256
40052b060229a0b036bdf73aa09ea1ecc6e73555f448dc092340ccb342ec1669
-
SHA512
d720c617ecab7e8b27a29148cb53ddd4ecde062fb21d2615d543518affdd819ccdd5e136add653a8bed8eaa2cf51c5eb8aa70114a33097dc4ea017fe2159b2a4
-
SSDEEP
6144:Qg75E+wPHpL/2Msl0MTwlCFDPPXykO9848WhTav+C/X:Qg2BHpLwwsFLfyrZJWv+K
Malware Config
Signatures
Files
-
003b1bb6ab590812e92a2e6013de7ead.exe.exe windows x86
b5beb20e57bbeebe33ad78c3eec1dbd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
webservices
WsFileTimeToDateTime
bcrypt
BCryptGenerateSymmetricKey
BCryptSetProperty
BCryptOpenAlgorithmProvider
BCryptDecrypt
ntdll
RtlEqualUnicodeString
NtQueryInformationProcess
RtlInitUnicodeString
kernel32
HeapFree
VirtualAlloc
HeapReAlloc
VirtualQuery
LocalAlloc
LocalFree
TerminateThread
CreateThread
WriteProcessMemory
GetCurrentProcess
OpenProcess
GetWindowsDirectoryA
VirtualProtectEx
VirtualAllocEx
CreateRemoteThread
WriteFile
CreateFileW
LoadLibraryW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
ReadFile
FindFirstFileA
GetBinaryTypeW
FindNextFileA
GetFullPathNameA
CreateFileA
GlobalAlloc
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileSize
FreeLibrary
SetDllDirectoryW
GetFileSizeEx
WaitForSingleObject
lstrcpyW
VirtualProtect
SetFilePointer
ReadProcessMemory
VirtualQueryEx
GetModuleHandleW
IsWow64Process
WaitForMultipleObjects
CreatePipe
PeekNamedPipe
DuplicateHandle
SetEvent
CreateEventA
GetModuleFileNameW
LoadResource
FindResourceW
GetComputerNameW
GlobalMemoryStatusEx
LoadLibraryExW
GetStartupInfoA
FindNextFileW
GetLogicalDriveStringsW
CopyFileW
GetDriveTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
WideCharToMultiByte
ReleaseMutex
TerminateProcess
K32GetModuleFileNameExW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
DeleteFileW
Wow64DisableWow64FsRedirection
GetSystemDirectoryW
Wow64RevertWow64FsRedirection
GetCurrentThread
K32GetModuleInformation
CreateFileMappingW
MapViewOfFile
Process32First
Process32Next
lstrcpyA
Sleep
MultiByteToWideChar
lstrcatA
lstrcmpA
lstrlenA
ExpandEnvironmentStringsW
lstrlenW
lstrcmpW
CreateProcessA
WinExec
CloseHandle
lstrcatW
GetPrivateProfileStringW
GetCommandLineA
GetModuleHandleA
GetTempPathW
VirtualFree
SetLastError
GetModuleFileNameA
CreateDirectoryW
SystemTimeToFileTime
GetLastError
ExitProcess
GetProcAddress
LoadLibraryA
GetProcessHeap
HeapAlloc
FindFirstFileW
GetTickCount
CreateProcessW
CreateMutexA
user32
FindWindowExA
CreateDesktopW
SendMessageA
GetKeyState
GetMessageA
DispatchMessageA
CreateWindowExW
CallNextHookEx
GetAsyncKeyState
RegisterClassW
GetRawInputData
MapVirtualKeyA
DefWindowProcA
RegisterRawInputDevices
TranslateMessage
GetForegroundWindow
GetKeyNameTextW
PostQuitMessage
GetLastInputInfo
CharLowerW
GetWindowTextW
wsprintfW
ToUnicode
advapi32
RegCreateKeyExW
RegSetValueExA
RegDeleteValueW
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
OpenProcessToken
RegEnumKeyExW
RegQueryInfoKeyA
RegOpenKeyW
RegDeleteKeyW
FreeSid
LookupAccountSidW
GetTokenInformation
GetSidIdentifierAuthority
OpenThreadToken
GetLengthSid
RegCreateKeyW
InitializeSecurityDescriptor
IsValidSid
CopySid
GetSidSubAuthority
GetSidSubAuthorityCount
RegDeleteKeyA
SetSecurityDescriptorDacl
RegOpenKeyExW
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyW
RegCloseKey
OpenServiceW
ChangeServiceConfigW
QueryServiceConfigW
EnumServicesStatusExW
StartServiceW
RegSetValueExW
RegCreateKeyExA
OpenSCManagerW
CloseServiceHandle
QueryServiceStatusEx
RegQueryValueExW
shell32
ord680
SHGetKnownFolderPath
SHFileOperationW
SHGetSpecialFolderPathW
ShellExecuteW
SHCreateDirectoryExW
SHGetFolderPathW
ShellExecuteExW
urlmon
URLDownloadToFileW
ws2_32
setsockopt
gethostbyname
freeaddrinfo
htons
recv
socket
send
WSAConnect
getaddrinfo
closesocket
inet_addr
InetNtopW
WSAStartup
shutdown
WSACleanup
connect
ole32
CoInitializeSecurity
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoInitialize
CoUninitialize
shlwapi
StrStrA
StrStrW
PathRemoveFileSpecA
PathCombineA
PathFindExtensionW
AssocQueryStringW
PathFindFileNameW
PathFileExistsW
netapi32
NetLocalGroupAddMembers
NetUserAdd
oleaut32
VariantInit
crypt32
CryptStringToBinaryA
CryptUnprotectData
CryptStringToBinaryW
wininet
InternetTimeToSystemTimeA
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ