Static task
static1
Behavioral task
behavioral1
Sample
3eef8081798f7184500405b15385c5bf8abbc2ce950412b89258955735145357.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3eef8081798f7184500405b15385c5bf8abbc2ce950412b89258955735145357.exe
Resource
win10v2004-20220812-en
General
-
Target
3eef8081798f7184500405b15385c5bf8abbc2ce950412b89258955735145357
-
Size
432KB
-
MD5
1d9a3ef3aab1159b36c5ceb92a682cc0
-
SHA1
c91ab4b0089513b5582bfe85a8a5dfdc39834921
-
SHA256
3eef8081798f7184500405b15385c5bf8abbc2ce950412b89258955735145357
-
SHA512
9ce2bc97092693347e1300bafd88d3515d94a2fbc85c4275361390d5bc84cdedd44ed8147ac55f853d2760678b0d901f421c29c46cb8fd2e07d812cedccb4270
-
SSDEEP
12288:nzM8+2EHmUxK4lk8zwUXN9Ea7t9IVlAPgV:nzMtzGUxdfXN9EkkVlAPg
Malware Config
Signatures
Files
-
3eef8081798f7184500405b15385c5bf8abbc2ce950412b89258955735145357.exe windows x86
36efd3279f9c15106927455239c91680
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetSetCookieA
kernel32
ExitProcess
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
WriteConsoleW
HeapReAlloc
GetModuleFileNameA
GetShortPathNameA
lstrcpyA
lstrcatA
GetEnvironmentVariableA
FindFirstFileA
FindNextFileA
FindClose
ExpandEnvironmentStringsA
GetVersionExA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetSystemTime
SystemTimeToFileTime
GetProcAddress
GetModuleHandleA
GetCurrentProcess
SetDllDirectoryA
LoadLibraryA
CopyFileA
FreeLibrary
DeleteFileA
OpenProcess
GetSystemInfo
VirtualQueryEx
ReadProcessMemory
Sleep
OpenMutexA
CreateMutexA
IsValidLocale
EnumSystemLocalesA
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
GetSystemTimeAsFileTime
GetModuleHandleW
SetEnvironmentVariableA
HeapAlloc
GetCommandLineA
HeapSetInformation
RtlUnwind
LCMapStringW
GetCPInfo
RaiseException
HeapCreate
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetTimeZoneInformation
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
GetLocaleInfoW
WriteFile
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
SetFilePointer
ReadFile
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
shell32
ShellExecuteA
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 436B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ