Static task
static1
Behavioral task
behavioral1
Sample
62d4db1b6224d1e6ebda223edc4fb7ccee75e4a858da50255dba2b85317aed06.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
62d4db1b6224d1e6ebda223edc4fb7ccee75e4a858da50255dba2b85317aed06.exe
Resource
win10v2004-20220812-en
General
-
Target
62d4db1b6224d1e6ebda223edc4fb7ccee75e4a858da50255dba2b85317aed06
-
Size
244KB
-
MD5
62cdde6491e9c779326fc8277dbf61be
-
SHA1
a8153264cc66dbaef0e0807d49054210e5cac2b1
-
SHA256
62d4db1b6224d1e6ebda223edc4fb7ccee75e4a858da50255dba2b85317aed06
-
SHA512
1f53305f03cc680e05784bdb4f57c7c0ba537fd5e5e9ce934a201245c9413159873d93ac6f1f7aa0a0d1cfecb8b49501d20e83334b99fffb44fc1fc5d41b64c1
-
SSDEEP
3072:4OZxw49PhO3WO715eYhDTZSZZlVvJ8IxvMiZehk6VPAggjwV2xW5YtL:Fw49pOmYBBNCZXJ6S7UVrC
Malware Config
Signatures
Files
-
62d4db1b6224d1e6ebda223edc4fb7ccee75e4a858da50255dba2b85317aed06.exe windows x86
fad75a8ae1b124c3c73a36d6e24cc7fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetFileSize
CreateFileA
MoveFileA
DeleteFileA
GetModuleFileNameA
FlushFileBuffers
WriteFile
SetFilePointer
GetSystemDirectoryA
CreateEventA
Sleep
CreateThread
GetModuleHandleA
GetCurrentProcess
ReleaseMutex
CreateMutexA
WinExec
GetCurrentDirectoryA
lstrlenA
GetSystemDefaultLangID
GetCurrentProcessId
FileTimeToSystemTime
CompareStringW
CompareStringA
SetEndOfFile
CreateFileW
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FindNextFileA
GetLogicalDriveStringsA
ResetEvent
SetEvent
FindClose
CopyFileA
lstrcpyA
lstrcatA
GetStdHandle
CreatePipe
SetStdHandle
GetStartupInfoA
CreateProcessA
ReadFile
GetLastError
WaitForSingleObject
SetFileAttributesA
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
SetEnvironmentVariableA
FreeEnvironmentStringsA
HeapSize
LoadLibraryA
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
HeapReAlloc
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetProcAddress
ExitProcess
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
user32
DispatchMessageA
PeekMessageA
DefWindowProcA
GetMessageA
CreateWindowExA
RegisterClassA
GetSystemMetrics
wsprintfA
TranslateMessage
EnumChildWindows
keybd_event
GetWindowTextA
GetClassNameA
mouse_event
GetWindowInfo
FindWindowExA
GetCursorPos
SetTimer
KillTimer
EnumWindows
PostMessageA
SetCursorPos
gdi32
CreateDCA
CreateDIBSection
CreateCompatibleDC
SelectObject
SetStretchBltMode
BitBlt
DeleteDC
DeleteObject
GetDeviceCaps
advapi32
RegSetValueExA
RegCreateKeyA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegCloseKey
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
shlwapi
PathFileExistsA
ws2_32
WSASetLastError
inet_ntoa
gethostbyname
gethostname
WSASocketA
connect
htons
WSAGetOverlappedResult
closesocket
WSAGetLastError
WSARecv
WSASend
setsockopt
recvfrom
sendto
bind
socket
WSAStartup
Sections
.text Size: 204KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE