Static task
static1
Behavioral task
behavioral1
Sample
b4220f44a7a1e6caee24f95c797f0c9d51e8e4cdedaa2f45334a56921c670240.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4220f44a7a1e6caee24f95c797f0c9d51e8e4cdedaa2f45334a56921c670240.exe
Resource
win10v2004-20220812-en
General
-
Target
b4220f44a7a1e6caee24f95c797f0c9d51e8e4cdedaa2f45334a56921c670240
-
Size
273KB
-
MD5
9211af63f1d97ebe17efdd2a933857f0
-
SHA1
a9c300ca1042a958ad11253d43c1ced05a0745a0
-
SHA256
b4220f44a7a1e6caee24f95c797f0c9d51e8e4cdedaa2f45334a56921c670240
-
SHA512
5251711f849d97f62251b4646446e08b278227491e6bf0bf94dc430725487b94d38a7a0ec1ad5ef541e69b750a6d587e62aede6434804da2b14ba020765d4531
-
SSDEEP
6144:DXUh2hoWbYoLQ6l/dt33E/idWbU2DwnLRad/OPBYjxabLH1:DXZouFdWQiGLRaWBzbLV
Malware Config
Signatures
Files
-
b4220f44a7a1e6caee24f95c797f0c9d51e8e4cdedaa2f45334a56921c670240.exe windows x86
39c9601b554d7a4d7f0aee2cf99119bf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
freeaddrinfo
gethostname
getaddrinfo
getnameinfo
inet_addr
advapi32
RegCloseKey
RegCreateKeyExW
RegEnumValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
ole32
CoTaskMemFree
CLSIDFromString
StringFromCLSID
CoGetMalloc
CoCreateInstance
StringFromGUID2
kernel32
InitializeCriticalSectionAndSpinCount
GetSystemInfo
SetFilePointer
RaiseException
ReleaseMutex
GetPrivateProfileIntW
GetCurrentDirectoryW
EnterCriticalSection
WriteFile
GetModuleHandleW
IsDBCSLeadByteEx
VirtualAlloc
GlobalMemoryStatus
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
DeleteCriticalSection
GetFullPathNameW
CreateEventW
GetPrivateProfileStringW
LocalFree
CreateMutexW
WideCharToMultiByte
UnhandledExceptionFilter
CloseHandle
ReadFile
LeaveCriticalSection
GetFileSize
WaitForSingleObject
OutputDebugStringW
GetSystemDefaultLCID
GetCurrentThreadId
CreateThread
DeleteFileW
FreeLibrary
MoveFileExW
CreateFileW
SetEndOfFile
GetLocalTime
VirtualFree
GetPrivateProfileSectionW
SystemTimeToFileTime
GetStartupInfoA
VirtualAllocEx
LoadLibraryA
FindResourceA
SetComputerNameW
CreatePipe
GetHandleInformation
SearchPathA
AddAtomA
GetSystemDirectoryW
GetWindowsDirectoryA
lstrcpynA
lstrcpyA
ReadDirectoryChangesW
ReplaceFileW
GetDiskFreeSpaceA
GlobalFindAtomA
EnumCalendarInfoA
GetCalendarInfoW
GetWindowsDirectoryW
SetComputerNameA
GetTempPathW
GetAtomNameW
GetExpandedNameW
LoadResource
RemoveDirectoryW
CreateMailslotW
GetACP
GetFullPathNameA
SetLocaleInfoA
CreateNamedPipeW
GetSystemTime
lstrcmpA
MoveFileW
FileTimeToDosDateTime
lstrcpyn
Beep
FindAtomW
SetCurrentDirectoryA
CreateNamedPipeA
GlobalDeleteAtom
WinExec
IsBadCodePtr
GetThreadLocale
EnumCalendarInfoW
IsValidLocale
GetTimeFormatA
CopyFileA
FindResourceW
lstrlenA
GetShortPathNameA
CreateSemaphoreA
SetCurrentDirectoryW
SearchPathW
GlobalAlloc
OpenMutexW
CopyFileExA
MoveFileA
GetCalendarInfoA
wininet
InternetSetOptionW
InternetCrackUrlW
InternetCloseHandle
InternetOpenW
DetectAutoProxyUrl
HttpQueryInfoA
InternetReadFile
InternetConnectW
InternetOpenUrlW
HttpOpenRequestW
HttpSendRequestA
crypt32
CryptProtectData
CryptUnprotectData
oleaut32
SysFreeString
LoadTypeLi
VariantCopy
VariantInit
SysAllocString
CreateErrorInfo
VariantChangeType
SysAllocStringLen
SysStringLen
VariantClear
SetErrorInfo
RegisterTypeLi
GetErrorInfo
user32
wsprintfW
tapi3
DllRegisterServer
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 237KB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ