Static task
static1
Behavioral task
behavioral1
Sample
b0698890995e74e487f1c12f8c4dc672a4d2ab625c082e2def54dc0734738cd3.exe
Resource
win7-20220901-en
General
-
Target
b0698890995e74e487f1c12f8c4dc672a4d2ab625c082e2def54dc0734738cd3
-
Size
402KB
-
MD5
4aeee39d2623ad1aabbc116a6dc215c0
-
SHA1
251311c13a38198bcabc9347c45bcbf03973c995
-
SHA256
b0698890995e74e487f1c12f8c4dc672a4d2ab625c082e2def54dc0734738cd3
-
SHA512
385afd7a94784547ece4c49d13fe3c48b9d1204209826541b1b84b7735fd1862d5fb8c722f360d51a1de9e3bc5bb51288aba49d6ef03fd481f38d91a7f40aafa
-
SSDEEP
12288:iAFtcQElfHQXBB2ZwtaDUI9sAPnQtcAA4i:iAFtcPNW2ZwtaDbsAfQufF
Malware Config
Signatures
Files
-
b0698890995e74e487f1c12f8c4dc672a4d2ab625c082e2def54dc0734738cd3.exe windows x86
33108da53ca74e23121568e341d992aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoW
psapi
GetProcessImageFileNameW
GetModuleInformation
kernel32
lstrlenW
CreateProcessW
MultiByteToWideChar
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
OpenEventW
SetEvent
ReadFile
SetFilePointer
GetFileSize
VirtualProtect
GetCurrentProcess
GetLastError
MoveFileExW
GetCurrentThreadId
WaitForSingleObject
ConnectNamedPipe
CreateNamedPipeW
WaitNamedPipeW
TerminateThread
DisconnectNamedPipe
GetPrivateProfileStringW
LocalFree
CreateThread
ExpandEnvironmentStringsW
FindFirstFileA
FindClose
GetPrivateProfileStringA
GetModuleFileNameA
FindNextFileA
SetHandleInformation
CreateProcessA
CreateEventW
CreatePipe
GetTempPathW
CreateDirectoryW
RemoveDirectoryW
GetStringTypeW
LoadLibraryW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
GetModuleHandleW
GetProcAddress
GetModuleFileNameW
GetTickCount
CloseHandle
Sleep
WriteFile
CreateFileW
SetFileAttributesW
DeleteFileW
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
SetEndOfFile
WriteConsoleW
GetLocalTime
FreeEnvironmentStringsW
GetFileType
SetHandleCount
RtlUnwind
IsProcessorFeaturePresent
LCMapStringW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapCreate
GetStdHandle
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
user32
GetMessageW
SetTimer
PostThreadMessageW
IsWindow
TranslateMessage
PostQuitMessage
SendMessageTimeoutW
KillTimer
FindWindowW
advapi32
RegQueryValueA
RegOpenKeyExA
RegQueryInfoKeyW
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
FreeSid
SetEntriesInAclW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHGetFolderPathW
SHGetFolderPathA
ole32
CoUninitialize
CoInitialize
shlwapi
PathFileExistsW
PathFindFileNameW
wnsprintfW
SHGetValueA
wnsprintfA
PathFileExistsA
wininet
InternetReadFile
InternetCloseHandle
InternetGetConnectedState
InternetOpenW
InternetOpenUrlW
HttpQueryInfoW
ws2_32
ntohl
htonl
urlmon
URLDownloadToFileW
Sections
.text Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 109KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE