Static task
static1
Behavioral task
behavioral1
Sample
1b1c135e62cdc0f704de7e49b594b2826e485baabfa3512f58351ba104892364.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1b1c135e62cdc0f704de7e49b594b2826e485baabfa3512f58351ba104892364.exe
Resource
win10v2004-20220812-en
General
-
Target
1b1c135e62cdc0f704de7e49b594b2826e485baabfa3512f58351ba104892364
-
Size
157KB
-
MD5
631041a500f79920e4f6814e51b4c530
-
SHA1
02f7d65fd81011aec04f69071dbf2e1324ba8dc8
-
SHA256
1b1c135e62cdc0f704de7e49b594b2826e485baabfa3512f58351ba104892364
-
SHA512
a1feb9c0d676efbf9f4d6f65f242930ce123c0603b2e1503711db4a6ee872c6468afa2eaa9d1bbcc1472eebb7df4c025818ecd39874dcd0622841ddcc82d354d
-
SSDEEP
3072:jG9bHrtWAE8X5B4bN4vvlLh9nC3SLzMiqX0vnJ:j4HcQXkbNu9Hn4WjqXqn
Malware Config
Signatures
Files
-
1b1c135e62cdc0f704de7e49b594b2826e485baabfa3512f58351ba104892364.exe windows x86
5b6ba338c56b25560ef091007e2870e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
LocalReAlloc
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
CreateProcessA
InitializeCriticalSection
ExitProcess
WriteFile
CreateFileA
GetModuleFileNameA
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
lstrcpyA
FindNextFileA
FindFirstFileA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
GetSystemInfo
GetComputerNameA
OpenEventA
SetErrorMode
CreateEventA
MoveFileExA
CreateDirectoryA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileStringA
lstrcmpA
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetProcAddress
Sleep
CloseHandle
FreeLibrary
SetEvent
WaitForSingleObject
LoadLibraryA
GetModuleHandleA
LCMapStringW
LCMapStringA
SetStdHandle
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
GetCurrentProcess
RtlUnwind
RaiseException
HeapAlloc
CreateThread
TlsSetValue
TlsGetValue
ExitThread
GetCommandLineA
GetVersion
TlsAlloc
SetLastError
SetUnhandledExceptionFilter
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
advapi32
InitializeSecurityDescriptor
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
OpenProcessToken
GetTokenInformation
LookupAccountSidA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
RegCreateKeyExA
RegSetValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ws2_32
__WSAFDIsSet
recvfrom
bind
getsockname
inet_ntoa
htonl
WSASocketA
WSAStartup
connect
inet_addr
send
closesocket
select
recv
socket
gethostbyname
htons
setsockopt
WSAIoctl
WSACleanup
sendto
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
shlwapi
PathFileExistsA
Sections
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ