Static task
static1
Behavioral task
behavioral1
Sample
4d9d3071201b63c949213f37f9184e82a75b78b9346ce26a09b5ef9ae08290d3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4d9d3071201b63c949213f37f9184e82a75b78b9346ce26a09b5ef9ae08290d3.exe
Resource
win10v2004-20220812-en
General
-
Target
4d9d3071201b63c949213f37f9184e82a75b78b9346ce26a09b5ef9ae08290d3
-
Size
516KB
-
MD5
538644ffa55e94517ac70342c23418e0
-
SHA1
f04ddc8ed4e4e560d1dd3d9087913cfed915161a
-
SHA256
4d9d3071201b63c949213f37f9184e82a75b78b9346ce26a09b5ef9ae08290d3
-
SHA512
8956e3e05d8e46937d6b2e0df9426e77a442b7d04f72c3d8379ffa3e2b7db68ddeff61c0e567933c2db642b7ddbff56717af20d59b4d2301fa70be2d726f1d9a
-
SSDEEP
12288:UROB95sARx6foY877777777v7777777777252gJZJrp3/alWJtbZU8JFtrymB:UROB9iARx6foY877777777v77777777I
Malware Config
Signatures
Files
-
4d9d3071201b63c949213f37f9184e82a75b78b9346ce26a09b5ef9ae08290d3.exe windows x86
ef02045307e28ac4083c4a2c48f5f955
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAStartup
WSACleanup
kernel32
FreeLibrary
Sleep
CreateFileMappingA
MapViewOfFile
HeapFree
WideCharToMultiByte
CreateFileA
LocalFree
FindResourceA
InterlockedCompareExchange
SetFilePointer
WriteFile
CloseHandle
GetCurrentProcessId
ReadFile
HeapAlloc
CreateMutexA
GetProcessHeap
GetLastError
FormatMessageA
VirtualFree
WaitForSingleObject
QueryPerformanceCounter
VirtualAlloc
InitializeCriticalSection
GlobalFree
ReleaseMutex
DeleteCriticalSection
InterlockedExchange
EnterCriticalSection
LeaveCriticalSection
GlobalAlloc
lstrlenA
FindFirstFileA
GetCurrentThreadId
OutputDebugStringA
FindClose
GetCurrentProcess
GetCommandLineA
TerminateProcess
RaiseException
CreateFileW
lstrlenW
lstrcmpiA
GetProcAddress
MultiByteToWideChar
VirtualQuery
TlsGetValue
FlushInstructionCache
GetEnvironmentVariableA
GetSystemInfo
IsDBCSLeadByte
TlsAlloc
SetLastError
UnmapViewOfFile
GetStdHandle
ExitProcess
TlsFree
IsValidCodePage
GetOEMCP
GetCPInfo
RtlUnwind
GetStartupInfoA
VirtualProtect
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeA
IsProcessorFeaturePresent
HeapSize
HeapReAlloc
HeapDestroy
GetThreadLocale
GetLocaleInfoA
GetACP
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
SizeofResource
LoadLibraryA
GetVersionExA
OpenFileMappingA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetTickCount
GetSystemTimeAsFileTime
FindResourceExA
GetModuleFileNameA
InterlockedDecrement
LockResource
GetModuleHandleA
LoadResource
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
InterlockedIncrement
LoadLibraryExA
WriteConsoleW
FlushFileBuffers
TlsSetValue
GetStringTypeW
user32
GetActiveWindow
CharNextA
MessageBoxA
EndDialog
GetMessageA
DestroyWindow
SetWindowLongA
DialogBoxParamA
LoadIconA
DispatchMessageA
UnregisterClassA
PeekMessageA
SendMessageA
wvsprintfA
SetWindowTextA
GetDlgItem
wsprintfA
TranslateMessage
advapi32
RegSetValueExA
SetSecurityDescriptorDacl
RegCreateKeyExA
InitializeSecurityDescriptor
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteValueA
shell32
ShellExecuteA
ole32
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
OleUninitialize
OleInitialize
CoTaskMemAlloc
oleaut32
SysAllocString
VariantClear
SysFreeString
VarUI4FromStr
SysStringLen
shlwapi
PathAppendW
Sections
.text Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
� Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE