Static task
static1
Behavioral task
behavioral1
Sample
1922d142ca2b956d26144f12c3fa5c110509b1aafa7362871ad514f79b15df9e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1922d142ca2b956d26144f12c3fa5c110509b1aafa7362871ad514f79b15df9e.exe
Resource
win10v2004-20220901-en
General
-
Target
1922d142ca2b956d26144f12c3fa5c110509b1aafa7362871ad514f79b15df9e
-
Size
41KB
-
MD5
71dcb6e548d5c88ad831fdc0852c47e0
-
SHA1
f77fcb4a35f5f9f384fd8b2c6c48f531e0fc9913
-
SHA256
1922d142ca2b956d26144f12c3fa5c110509b1aafa7362871ad514f79b15df9e
-
SHA512
8a649bf8541b8834746a7f2dceda121dcad8483210fe81e0f416f1b32ea0004fff9566544973a0ba303fe9724baf84000b2166c2c471f9b022479756e160c802
-
SSDEEP
768:mCUUsb2/BxO0JtdJoqXLSdabeHn0hKsC51kracD1VnJAJTAG:m1Uv/n7zJoqWdbn00GOcpVJAJTA
Malware Config
Signatures
Files
-
1922d142ca2b956d26144f12c3fa5c110509b1aafa7362871ad514f79b15df9e.exe windows x86
5d59935744c2951aba607e801e09dcde
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcessModules
GetModuleFileNameExA
GetProcessImageFileNameA
userenv
GetAllUsersProfileDirectoryA
iphlpapi
GetAdaptersInfo
wininet
InternetReadFile
InternetCloseHandle
HttpSendRequestA
InternetSetOptionA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetQueryOptionA
InternetCrackUrlA
InternetOpenA
InternetConnectA
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
socket
shlwapi
wnsprintfA
kernel32
TerminateThread
GetExitCodeProcess
WriteProcessMemory
GetTickCount
GetSystemDirectoryA
GetVolumeInformationA
WideCharToMultiByte
lstrcpynA
GetCurrentProcess
Sleep
CreateThread
CopyFileA
lstrcpyA
lstrcmpiA
GetEnvironmentVariableA
lstrlenA
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
OpenProcess
Process32Next
GetCurrentProcessId
CloseHandle
Process32First
CreateToolhelp32Snapshot
CreateProcessA
VirtualAlloc
ResumeThread
SetThreadContext
GetThreadContext
GetTempFileNameA
TerminateProcess
VirtualAllocEx
VirtualFree
lstrcatA
CreateRemoteThread
WaitForSingleObject
ReadFile
GetFileSize
CreateFileA
CreateMutexA
GetModuleFileNameA
QueryPerformanceCounter
ExitProcess
WriteFile
SetUnhandledExceptionFilter
user32
wsprintfA
advapi32
CryptEncrypt
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
OpenProcessToken
RegQueryValueExA
CryptReleaseContext
GetTokenInformation
CreateWellKnownSid
EqualSid
CryptDecrypt
RegCloseKey
CryptAcquireContextA
CryptGenKey
CryptExportKey
CryptDestroyKey
CryptImportKey
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
StringFromCLSID
CoCreateInstance
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rsmzjup Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE