Static task
static1
Behavioral task
behavioral1
Sample
b4cc986590eae9be5976a1575118dec9539c9eebaab2edbbdc46e74afe031320.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b4cc986590eae9be5976a1575118dec9539c9eebaab2edbbdc46e74afe031320.exe
Resource
win10v2004-20220812-en
General
-
Target
b4cc986590eae9be5976a1575118dec9539c9eebaab2edbbdc46e74afe031320
-
Size
645KB
-
MD5
20400122cdeb38d5957da764b2c377f0
-
SHA1
a89a7b2009c541b7f1d952571acb03cd3ac250ab
-
SHA256
b4cc986590eae9be5976a1575118dec9539c9eebaab2edbbdc46e74afe031320
-
SHA512
61a76de1c618c12848d5b63d9200eb473485ebdb29ddcd89fe1bb4610da1ca05bafdec0e6d33794b7c156e78927f4f7b6caa27095a6504920efaf413b6bd011e
-
SSDEEP
12288:sz3pBspSJ3Agu+QgzfKJPPV7SV3p05GGRkZqEoTKlu:+2pmZJzfKJPPC3pb5+
Malware Config
Signatures
Files
-
b4cc986590eae9be5976a1575118dec9539c9eebaab2edbbdc46e74afe031320.exe windows x64
f9c46dc6c0081d1bc6c5e3e6be32ee86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetNumberFormatW
CreateFileW
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetDateFormatW
GetTimeFormatW
GetLocaleInfoW
GetUserDefaultLocaleName
LocaleNameToLCID
GetUserDefaultLCID
FormatMessageW
lstrlenW
LocalAlloc
WriteConsoleW
GetStdHandle
GetModuleFileNameW
FileTimeToSystemTime
GetComputerNameExW
CompareStringA
GetFileType
HeapSize
GetThreadLocale
CreateMutexW
MultiByteToWideChar
CompareStringW
ReadFile
HeapValidate
SetConsoleMode
GetConsoleMode
WideCharToMultiByte
ReadConsoleW
SetThreadUILanguage
GetProcessHeap
HeapFree
VerSetConditionMask
HeapAlloc
lstrlenA
HeapReAlloc
ExitProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetLastError
SetLastError
VerifyVersionInfoW
LocalFree
Sleep
GetConsoleOutputCP
SetUnhandledExceptionFilter
GetModuleHandleW
QueryPerformanceCounter
msvcrt
_wcsicmp
__CxxFrameHandler3
_CxxThrowException
memset
_get_osfhandle
_memicmp
wcstod
?terminate@@YAXXZ
??1type_info@@UEAA@XZ
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__wgetmainargs
wcschr
_vsnwprintf
memcpy
_wtoi
localtime
_stricmp
_strnicmp
_wcsnset
wcstok
_ltow
swprintf_s
_wsetlocale
_iob
??_V@YAXPEAX@Z
??3@YAXPEAX@Z
??2@YAPEAX_K@Z
wcstoul
__iob_func
fflush
_errno
wcstol
fprintf
_fileno
user32
CharUpperW
LoadStringW
wsprintfW
mpr
WNetAddConnection2W
WNetGetLastErrorW
WNetCancelConnection2W
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
oleaut32
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocString
VariantCopy
VariantClear
VariantChangeType
VariantInit
framedynos
?GetBuffer@CHString@@QEAAPEAGH@Z
?ReleaseBuffer@CHString@@QEAAXH@Z
?FindOneOf@CHString@@QEBAHPEBG@Z
??0CHString@@QEAA@XZ
??4CHString@@QEAAAEBV0@AEBV0@@Z
?Compare@CHString@@QEBAHPEBG@Z
?Mid@CHString@@QEBA?AV1@H@Z
??0CHString@@QEAA@PEBG@Z
??1CHString@@QEAA@XZ
?GetData@CHString@@IEBAPEAUCHStringData@@XZ
?Find@CHString@@QEBAHG@Z
?Left@CHString@@QEBA?AV1@H@Z
??4CHString@@QEAAAEBV0@PEBG@Z
?Format@CHString@@QEAAXPEBGZZ
?GetBufferSetLength@CHString@@QEAAPEAGH@Z
shlwapi
StrStrW
StrCmpNW
StrStrIW
StrChrW
StrChrIW
secur32
GetUserNameExW
ws2_32
FreeAddrInfoW
WSAStartup
WSAGetLastError
GetNameInfoW
WSACleanup
GetAddrInfoW
netapi32
NetServerGetInfo
NetApiBufferFree
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 552KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE