Static task
static1
Behavioral task
behavioral1
Sample
d02147bd3369e31ab2ae22cc824369289d2596b1678357be51bd185f5b151367.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d02147bd3369e31ab2ae22cc824369289d2596b1678357be51bd185f5b151367.exe
Resource
win10v2004-20220812-en
General
-
Target
d02147bd3369e31ab2ae22cc824369289d2596b1678357be51bd185f5b151367
-
Size
649KB
-
MD5
74f77163b4e0eb7ce5b80a6862d8ee0c
-
SHA1
e2ed74232cffa2a05631c2565b9760a35557a9aa
-
SHA256
d02147bd3369e31ab2ae22cc824369289d2596b1678357be51bd185f5b151367
-
SHA512
0916e6293f2a9e7efb25edb9bf49dd28a23c0519bba7ac262f3531ab5aa7ae2de67a0760d960dcae9a9ce526d18991138a1990a9af0d88a10681b53ade2297aa
-
SSDEEP
12288:vONLwAjc1Aj3l1oOCtTbmSbERVxqo8WgaKNNJUIc830joXAuNtW:vON7jcCjF+P+x7bga4JU77joQIM
Malware Config
Signatures
Files
-
d02147bd3369e31ab2ae22cc824369289d2596b1678357be51bd185f5b151367.exe windows x86
e20328498ed4cf9441918580ebb32796
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
Sleep
DeleteFileW
CreateFileA
GetProcessHeap
SetEndOfFile
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
CloseHandle
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
CreateFileW
SetStdHandle
advapi32
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
wininet
InternetCrackUrlW
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
InternetSetOptionW
HttpSendRequestW
HttpQueryInfoW
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 508KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE