Static task
static1
Behavioral task
behavioral1
Sample
30bb380ec0ed518e382938ecb0cebe7386f098842e069bf1f253807aff2077eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
30bb380ec0ed518e382938ecb0cebe7386f098842e069bf1f253807aff2077eb.exe
Resource
win10v2004-20220812-en
General
-
Target
30bb380ec0ed518e382938ecb0cebe7386f098842e069bf1f253807aff2077eb
-
Size
664KB
-
MD5
696cb76cc0bd5943bbd24b626fa9feb0
-
SHA1
ce93306c22b5e6d8e180440be276b8cbc2e24e6a
-
SHA256
30bb380ec0ed518e382938ecb0cebe7386f098842e069bf1f253807aff2077eb
-
SHA512
0f126f764b314ce57310887c03f73731dd34d79c97dc93065cc9a4ea9a117f56067c8eb020a03fd9ef38437edd28f9695464baa1b6ee70eb4b5d4e409bcfcbe8
-
SSDEEP
12288:ApUjn+vMBLWg/iscQJ9a9wpPZNLXqs76P:ASj+vMEsTgwpPZRR76P
Malware Config
Signatures
Files
-
30bb380ec0ed518e382938ecb0cebe7386f098842e069bf1f253807aff2077eb.exe windows x86
5082516ae2bcc802b70285b3936027b0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
kernel32
GetLastError
InterlockedIncrement
lstrcmpiA
IsDBCSLeadByte
DebugBreak
OutputDebugStringA
SetLastError
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
CreateProcessA
GetCurrentDirectoryA
CreateEventA
GetProcAddress
CloseHandle
ReadFile
CreateFileA
WriteFile
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateDirectoryA
lstrcpyA
OpenEventA
lstrlenW
GetDateFormatA
GetTimeFormatA
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileW
SetHandleCount
GetFileType
SetStdHandle
GetTimeZoneInformation
HeapSize
Sleep
GetStdHandle
ExitProcess
FatalAppExitA
HeapCreate
HeapDestroy
GetStringTypeW
GetStringTypeA
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
InterlockedDecrement
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CompareStringW
RaiseException
GetCurrentThread
TlsFree
TlsSetValue
CompareStringA
FlushFileBuffers
GetLocaleInfoW
SetEndOfFile
SetConsoleCtrlHandler
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
TlsAlloc
TlsGetValue
GetOEMCP
SetEnvironmentVariableA
GetEnvironmentStringsW
GetVersionExA
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
VirtualProtect
GetSystemInfo
VirtualQuery
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointer
GetCommandLineA
GetStartupInfoA
GetCPInfo
GetUserDefaultLCID
user32
GetSystemMetrics
LoadImageA
PostMessageA
IsWindow
EndDialog
GetSysColorBrush
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
UnregisterClassA
MapWindowPoints
SetWindowPos
SendMessageA
GetDlgItem
KillTimer
SetTimer
SetWindowTextA
GetWindowLongA
DefWindowProcA
GetActiveWindow
MessageBoxA
DialogBoxParamA
DestroyWindow
CharNextA
LoadStringA
SetWindowLongA
GetClientRect
gdi32
SetTextColor
SetBkMode
advapi32
RegQueryValueExA
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
ole32
CoFreeLibrary
CoLoadLibrary
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
comctl32
InitCommonControlsEx
Sections
.text Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE