Static task
static1
Behavioral task
behavioral1
Sample
20c14d585f7343214e1a28259a93f7246a74f72da037a7d554d39214b6642482.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20c14d585f7343214e1a28259a93f7246a74f72da037a7d554d39214b6642482.exe
Resource
win10v2004-20220812-en
General
-
Target
20c14d585f7343214e1a28259a93f7246a74f72da037a7d554d39214b6642482
-
Size
57KB
-
MD5
833b240e5e8ca1f05988f26e580d35ea
-
SHA1
5dd4b520165a848a8ada0c24d99e9cf197be7069
-
SHA256
20c14d585f7343214e1a28259a93f7246a74f72da037a7d554d39214b6642482
-
SHA512
8e213c01923ab46642fa40fa992a95d0c3a313ce034fc8a98a274a8040b15b9417e534bbde240d6a09f89c6d831b4089d5ee47263f9087d3d0163ef69af15410
-
SSDEEP
1536:D6mVFco8M9D7GD/WWG9MohaqYN1WDGjUWRMYb:DhmmM0NqUWRMYb
Malware Config
Signatures
Files
-
20c14d585f7343214e1a28259a93f7246a74f72da037a7d554d39214b6642482.exe windows x86
0243120c8b38208b85048e6edecfe42c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??2@YAPAXI@Z
??3@YAXPAX@Z
strstr
strrchr
memcpy
srand
rand
memset
_except_handler3
shlwapi
PathFileExistsA
SHGetValueA
SHSetValueA
urlmon
URLDownloadToFileA
kernel32
DeleteFileA
lstrcpynA
RemoveDirectoryA
CreateEventA
SetEvent
SetFileAttributesA
lstrcmpiA
FlushViewOfFile
SetEndOfFile
FindNextFileA
WaitForMultipleObjects
FindClose
GetLogicalDriveStringsA
FindFirstFileA
CreateFileA
GetFileSize
lstrlenA
MapViewOfFile
UnmapViewOfFile
Sleep
CreateFileMappingA
WinExec
CloseHandle
ExitProcess
VirtualQuery
FreeLibrary
WaitForSingleObject
GetSystemTimeAsFileTime
GetSystemDirectoryA
ExitThread
GetModuleFileNameA
GetModuleHandleA
GetTempPathA
SetFilePointer
CreateThread
lstrcpyA
VirtualFree
SetFileTime
WriteFile
GetExitCodeProcess
CreateProcessA
ReadFile
VirtualAlloc
CopyFileA
GetFileTime
GetDriveTypeA
user32
wsprintfA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE