Static task
static1
Behavioral task
behavioral1
Sample
7d972b2347fdb258e655be1c969bb9fbdafe020b4b050376cf28c728d9451de8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7d972b2347fdb258e655be1c969bb9fbdafe020b4b050376cf28c728d9451de8.exe
Resource
win10v2004-20220901-en
General
-
Target
7d972b2347fdb258e655be1c969bb9fbdafe020b4b050376cf28c728d9451de8
-
Size
120KB
-
MD5
3e13004633349b94bec8fcc0439ecec1
-
SHA1
31b48df2485631502f35f93d223545445a63add4
-
SHA256
7d972b2347fdb258e655be1c969bb9fbdafe020b4b050376cf28c728d9451de8
-
SHA512
1d7700983113f1bbb10296b813365a9315fb2ec2650a0b8bed5c03b4bb218236cf1956f9b9e21b511682bfca0c17c9437c604cc79e8457edaec2f407b0e6afc2
-
SSDEEP
3072:fPYJGjLMb6lF4ibnwTXw8zyIKll8naEBQu:f8wMWhnwTg8znz
Malware Config
Signatures
Files
-
7d972b2347fdb258e655be1c969bb9fbdafe020b4b050376cf28c728d9451de8.exe windows x86
454ea035e37695d9830b1bf53583ad9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingW
GetFileSize
CreateFileW
DeleteFileW
WriteFile
ExpandEnvironmentStringsW
LoadLibraryA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetOEMCP
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
GetEnvironmentVariableW
TerminateProcess
lstrcatW
lstrcpynW
GetVersionExW
LoadLibraryW
GetProcAddress
FreeLibrary
MultiByteToWideChar
WaitForSingleObject
GetSystemInfo
GetVolumeInformationW
GetCommandLineW
CreateEventW
OpenEventW
SetEvent
CloseHandle
GetModuleFileNameW
GetLastError
Sleep
LocalAlloc
GetACP
GetCPInfo
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
SetEnvironmentVariableA
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LocalFree
lstrlenW
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcessId
GetFileAttributesW
LCMapStringW
LCMapStringA
HeapSize
GetCurrentProcess
HeapReAlloc
HeapAlloc
RaiseException
HeapFree
ExitProcess
GetVersion
GetCommandLineA
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetModuleHandleA
GetStartupInfoA
user32
wsprintfW
advapi32
RegCreateKeyW
RegQueryValueExW
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
DeleteService
CreateServiceW
ChangeServiceConfig2W
StartServiceW
StartServiceCtrlDispatcherW
RegOpenKeyExW
RegisterServiceCtrlHandlerExW
SetServiceStatus
OpenSCManagerW
OpenServiceW
CloseServiceHandle
ControlService
QueryServiceStatus
RegDeleteValueW
RegSetValueExW
RegCloseKey
shell32
ShellExecuteW
shlwapi
UrlGetPartW
StrStrIW
dnsapi
DnsFree
wininet
InternetQueryOptionW
HttpOpenRequestW
HttpSendRequestW
InternetConnectW
InternetOpenW
HttpQueryInfoW
InternetReadFile
InternetCrackUrlW
InternetCloseHandle
InternetSetOptionW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
urlmon
URLDownloadToFileW
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ