Static task
static1
Behavioral task
behavioral1
Sample
73fbdbcf639740fdaaf6c1d2dc6c22ce1622f632d0e125acab7215623710f298.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73fbdbcf639740fdaaf6c1d2dc6c22ce1622f632d0e125acab7215623710f298.exe
Resource
win10v2004-20220901-en
General
-
Target
73fbdbcf639740fdaaf6c1d2dc6c22ce1622f632d0e125acab7215623710f298.bin
-
Size
400KB
-
MD5
a757111fb8c59c58f18595b332cb6f51
-
SHA1
ff8ca1383dd8cd3a7255c5d027ccc33a3f0b8a05
-
SHA256
73fbdbcf639740fdaaf6c1d2dc6c22ce1622f632d0e125acab7215623710f298
-
SHA512
7302e3ed6bb2ca5faada0a3539f6a0993288e52552fe1f05f038dd9de10293c13c62e773e16f906e63668644c929f292d1d3a1a765a4331f4a19219c9ba9a302
-
SSDEEP
12288:CHJfYhK0bUticPtFZboqWIN+hKyDvp7fcMFEWB4cFIzU:CJWu+pFEshFCU
Malware Config
Signatures
Files
-
73fbdbcf639740fdaaf6c1d2dc6c22ce1622f632d0e125acab7215623710f298.bin.exe windows x86
d47e7613185268ac6deec2ce8f67e2c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
CreateProcessW
FindFirstFileW
WriteProcessMemory
VirtualProtect
FindNextFileW
GetCurrentProcess
VirtualAlloc
GetSystemDirectoryW
ResumeThread
GetLastError
LoadLibraryA
VirtualProtectEx
GetThreadContext
VirtualAllocEx
ReadProcessMemory
SetThreadContext
CreateThread
FreeLibrary
GetNativeSystemInfo
GetComputerNameW
GlobalMemoryStatusEx
GetModuleHandleW
WriteFile
GetTempPathW
GetVolumeInformationA
CreateFileW
GetFileAttributesW
OpenProcess
SetFileAttributesW
CreateToolhelp32Snapshot
MultiByteToWideChar
Process32NextW
Process32FirstW
LoadLibraryW
GetLocalTime
CopyFileW
WideCharToMultiByte
QueryFullProcessImageNameW
IsWow64Process
ReadFile
GetFileSizeEx
VirtualFree
SetErrorMode
GetCurrentThread
GetCurrentProcessId
SetThreadExecutionState
GetTickCount64
DeleteFileW
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetModuleHandleA
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapSize
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
TerminateProcess
CloseHandle
Sleep
ReleaseMutex
WaitForSingleObject
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FindClose
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetFileType
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
GetStdHandle
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
RaiseException
RtlUnwind
SetUnhandledExceptionFilter
CreateMutexW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LocalFree
LCMapStringEx
GetStringTypeW
IsProcessorFeaturePresent
user32
DefWindowProcW
DispatchMessageW
GetLastInputInfo
GetWindowTextW
ShutdownBlockReasonCreate
CreateWindowExA
GetMessageW
RegisterDeviceNotificationW
ShutdownBlockReasonDestroy
UnregisterDeviceNotification
RegisterClassExA
GetWindowTextLengthW
GetForegroundWindow
TranslateMessage
advapi32
GetUserNameW
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
shell32
ShellExecuteW
SHGetKnownFolderPath
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoTaskMemFree
CoUninitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
wininet
InternetCloseHandle
InternetOpenW
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
DeleteUrlCacheEntryA
InternetSetOptionA
ws2_32
WSAGetLastError
setsockopt
ioctlsocket
freeaddrinfo
recv
connect
socket
send
getaddrinfo
select
closesocket
__WSAFDIsSet
WSAStartup
WSACleanup
ntdll
NtUnmapViewOfSection
avicap32
capGetDriverDescriptionW
Sections
.text Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ