Static task
static1
Behavioral task
behavioral1
Sample
a66ddb6c98cb3e4e3920ee15b11065c3eb19a416d796befc4210145c8e1a6171.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a66ddb6c98cb3e4e3920ee15b11065c3eb19a416d796befc4210145c8e1a6171.exe
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
a66ddb6c98cb3e4e3920ee15b11065c3eb19a416d796befc4210145c8e1a6171.exe
Resource
win10v2004-20220812-en
General
-
Target
a66ddb6c98cb3e4e3920ee15b11065c3eb19a416d796befc4210145c8e1a6171
-
Size
320KB
-
MD5
9cbe4bd27eba8c70b6eddaeb6707659b
-
SHA1
4081534be988db8ef623df4ffbdccb7e1a60e38d
-
SHA256
a66ddb6c98cb3e4e3920ee15b11065c3eb19a416d796befc4210145c8e1a6171
-
SHA512
6bd44099280fd38bb58e79159045d6dc166813bec27483d6d28352bde8e239669e24adb1f4af8f9a670171bbfa07e52ddd5ffa2e83888d90250632423737549e
-
SSDEEP
6144:8YQ8NHLPxPdIpkC/U6PcOvex2RNfBkBsKm3D9tAOYNon:8QNr5l6PcOmx2jJtS6
Malware Config
Signatures
Files
-
a66ddb6c98cb3e4e3920ee15b11065c3eb19a416d796befc4210145c8e1a6171.exe windows x86
5b6263df169db06733034f4ebc321177
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
WriteFile
TerminateProcess
GetTempPathW
CreateMutexW
InitializeCriticalSectionEx
FindClose
CreateMutexA
GetVolumeInformationA
WaitForSingleObject
CreateFileW
GetFileAttributesW
ReleaseMutex
GetSystemDirectoryW
ResumeThread
OpenProcess
SetFileAttributesW
MultiByteToWideChar
GetSystemWow64DirectoryW
Sleep
GetLastError
DeleteFileW
CloseHandle
RaiseException
CreateThread
GetLocalTime
FindNextFileW
DecodePointer
GetThreadContext
GetWindowsDirectoryW
VirtualAllocEx
DeleteCriticalSection
ReadProcessMemory
GetComputerNameW
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
SetThreadContext
IsWow64Process
LoadLibraryExW
RtlUnwind
OutputDebugStringW
InitializeSListHead
GetSystemTimeAsFileTime
WriteConsoleW
GetConsoleOutputCP
FlushFileBuffers
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
WriteProcessMemory
FindFirstFileW
VirtualProtectEx
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapReAlloc
GetConsoleMode
GetTimeZoneInformation
SetFilePointerEx
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapFree
HeapAlloc
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
GetProcAddress
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
EnterCriticalSection
LeaveCriticalSection
EncodePointer
LocalFree
LCMapStringEx
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
user32
GetWindowTextLengthW
GetMessageW
DefWindowProcW
RegisterClassExW
DispatchMessageW
ShutdownBlockReasonCreate
GetForegroundWindow
TranslateMessage
CreateWindowExW
GetWindowTextW
ShutdownBlockReasonDestroy
advapi32
GetUserNameW
ole32
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
wininet
DeleteUrlCacheEntryA
urlmon
URLOpenBlockingStreamA
ws2_32
ioctlsocket
WSACleanup
freeaddrinfo
recv
connect
socket
send
setsockopt
getaddrinfo
shutdown
select
WSAGetLastError
closesocket
__WSAFDIsSet
WSAStartup
ntdll
NtUnmapViewOfSection
Sections
.text Size: 233KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ