Static task
static1
Behavioral task
behavioral1
Sample
ee8dd4df27d1c0b56b0e72769e7c2621da453a0009cf6cdf4f818ceeaf5554b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee8dd4df27d1c0b56b0e72769e7c2621da453a0009cf6cdf4f818ceeaf5554b4.exe
Resource
win10v2004-20220812-en
General
-
Target
ee8dd4df27d1c0b56b0e72769e7c2621da453a0009cf6cdf4f818ceeaf5554b4
-
Size
198KB
-
MD5
808816ccf71520f59620a36691cf8f60
-
SHA1
32e566550d6dfee211fbbe14148cabff3a55f69d
-
SHA256
ee8dd4df27d1c0b56b0e72769e7c2621da453a0009cf6cdf4f818ceeaf5554b4
-
SHA512
741f56966dabe9c9c827da254918cd5f8e15ba106a192f968b0d30cbf5e9191c54118f45ea19673908a7c0183666b4148f79f4d2c0d8148af8bcd29f76f9c556
-
SSDEEP
3072:PohvdEL2vMB64BcQb7RPwHOU1YyIFocEn/dOycz76Rv/XfT0ANHQqT:P+Dg7bVwHOUYyIFocSdOycnKnL0M
Malware Config
Signatures
Files
-
ee8dd4df27d1c0b56b0e72769e7c2621da453a0009cf6cdf4f818ceeaf5554b4.exe windows x86
1a2b1de1f24ee4c8275862453d5b8094
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveExtensionA
PathFindFileNameA
PathFileExistsA
UrlUnescapeA
msvcr90
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
strstr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
_except_handler4_common
_mbsinc
_vsnprintf
fseek
fread
fflush
fwrite
sprintf
_mbclen
memcpy
strncmp
strtol
memmove
??3@YAXPAX@Z
__CxxFrameHandler3
memset
printf
strcat_s
_endthreadex
wcsnlen
_beginthreadex
vsprintf_s
_vscprintf
_mbsstr
_mbscmp
strnlen
??_U@YAPAXI@Z
atol
_mbsupr_s
strcpy_s
_mbsrchr
atoi
calloc
??_V@YAXPAX@Z
strncpy
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
free
memmove_s
memcpy_s
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
malloc
strchr
_CxxThrowException
??2@YAPAXI@Z
_controlfp_s
kernel32
HeapSize
RaiseException
HeapDestroy
HeapReAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedCompareExchange
lstrlenW
InterlockedDecrement
FormatMessageA
GetACP
GetComputerNameA
ReadDirectoryChangesW
DeleteFileW
GetTempPathA
CopyFileA
GetFullPathNameA
SetThreadPriority
ResumeThread
CreateToolhelp32Snapshot
Process32First
Process32Next
GetModuleHandleA
FreeResource
ExitProcess
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetTickCount
DeviceIoControl
GetStartupInfoA
TerminateProcess
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateEventA
lstrcpyA
WaitForSingleObject
SetEvent
InterlockedExchange
Sleep
CloseHandle
lstrlenA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileStringA
GetVersionExA
GetLastError
CreateProcessA
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetFileSize
CreateFileA
WriteFile
SetFilePointer
ReadFile
GetModuleFileNameA
SetLastError
GetCurrentThreadId
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
GetSystemInfo
user32
GetSystemMetrics
GetUserObjectInformationA
CloseDesktop
GetInputState
PostThreadMessageA
GetMessageA
SetThreadDesktop
CreateDesktopA
OpenInputDesktop
GetThreadDesktop
PostMessageA
GetClassNameA
GetWindowTextA
EnumWindows
advapi32
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
shell32
SHGetFolderPathA
ShellExecuteExA
ole32
CoInitialize
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
oleaut32
VariantInit
VariantClear
SysAllocString
SysFreeString
wininet
InternetReadFile
HttpSendRequestExA
InternetWriteFile
InternetCloseHandle
InternetConnectA
InternetOpenUrlA
InternetOpenA
HttpAddRequestHeadersA
HttpQueryInfoA
HttpEndRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
HttpOpenRequestA
InternetGetLastResponseInfoA
InternetSetOptionA
iphlpapi
GetAdaptersInfo
netapi32
Netbios
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rztlkpp Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE