Static task
static1
Behavioral task
behavioral1
Sample
99debf0f8b2c080885bd9cec685ae51c1498bb27b8bed6e48c4ab00f626ffe7a.exe
Resource
win7-20220812-en
General
-
Target
99debf0f8b2c080885bd9cec685ae51c1498bb27b8bed6e48c4ab00f626ffe7a
-
Size
318KB
-
MD5
70c9f9ab17cfa97f75a3675c6134c190
-
SHA1
643936a9c9a6aafadfc151dc6cf42c82f661ddc3
-
SHA256
99debf0f8b2c080885bd9cec685ae51c1498bb27b8bed6e48c4ab00f626ffe7a
-
SHA512
fda9845503f276918c68c95c4209a9f70ea43f1845591f26220b5f680da8a46945dfe2cb620e274e81a0e8579ca705021698fcdc8654cc86e043160986cf5223
-
SSDEEP
6144:E6KkJbTUnIe7eBqYvaHFMIhEEFjfq0Xp9n4ngNoZhVKcOnGvn3:EqJfgZw/vaHXhD59iIoZWclvn3
Malware Config
Signatures
Files
-
99debf0f8b2c080885bd9cec685ae51c1498bb27b8bed6e48c4ab00f626ffe7a.exe windows x86
abb5ea34498be44783c3e4957e756bfa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegNotifyChangeKeyValue
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryInfoKeyW
RegEnumKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegEnumKeyA
RegQueryInfoKeyA
gdi32
GetStockObject
wininet
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetConnectA
InternetOpenA
InternetCrackUrlA
InternetErrorDlg
InternetTimeToSystemTime
InternetTimeFromSystemTime
kernel32
SetEndOfFile
InitializeCriticalSection
SetEnvironmentVariableA
CompareStringW
CreateFileW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
WriteConsoleW
LCMapStringW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
CloseHandle
WriteFile
lstrlenA
SetFilePointer
CreateFileA
GetTempPathA
lstrcatA
GetEnvironmentVariableA
LoadLibraryA
GetLastError
GetSystemDirectoryA
SetDllDirectoryA
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetProcAddress
GetModuleHandleA
lstrcmpA
CreateProcessA
CreateMutexA
CreateEventA
WaitForSingleObject
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
InterlockedIncrement
InterlockedDecrement
lstrcmpiA
WaitForMultipleObjects
GetCommandLineA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetThreadLocale
lstrcpyA
SetEvent
ResetEvent
CreateThread
lstrcpynA
ReadFile
SetHandleInformation
CreatePipe
Sleep
OpenEventA
GetSystemTime
DeleteFileA
GetVersionExA
GetCurrentProcess
GetSystemInfo
LocalFree
SystemTimeToTzSpecificLocalTime
CompareFileTime
SystemTimeToFileTime
GetTickCount
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
GetProcessHeap
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
HeapSize
HeapReAlloc
HeapCreate
GetModuleFileNameW
GetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
IsProcessorFeaturePresent
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetTimeZoneInformation
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
HeapSetInformation
ExitProcess
DecodePointer
EncodePointer
VirtualQuery
GetModuleHandleW
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
RtlUnwind
GetSystemTimeAsFileTime
user32
wsprintfA
CharNextA
PeekMessageA
DispatchMessageA
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
MsgWaitForMultipleObjectsEx
LoadStringA
GetDesktopWindow
MessageBoxA
RegisterClassA
CreateWindowExA
ShowWindow
SetWindowLongA
DestroyWindow
GetWindowLongA
DefWindowProcA
PostQuitMessage
CreatePopupMenu
AppendMenuA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
GetSystemMetrics
LoadImageA
DispatchMessageW
ole32
CoTaskMemRealloc
CoCreateInstance
CLSIDFromString
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
shell32
Shell_NotifyIconA
ShellExecuteA
oleaut32
VarUI4FromStr
Sections
.text Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE