Static task
static1
Behavioral task
behavioral1
Sample
0ca4293b2ff3dadac0e7cb7b7164389740b9ee890a6ec606205c0bbb4218ec12.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ca4293b2ff3dadac0e7cb7b7164389740b9ee890a6ec606205c0bbb4218ec12.exe
Resource
win10v2004-20220812-en
General
-
Target
0ca4293b2ff3dadac0e7cb7b7164389740b9ee890a6ec606205c0bbb4218ec12
-
Size
303KB
-
MD5
80026339a1bda9aead9570ad34514f09
-
SHA1
7cb62f656923bb7345ed04a5645feeac43a13618
-
SHA256
0ca4293b2ff3dadac0e7cb7b7164389740b9ee890a6ec606205c0bbb4218ec12
-
SHA512
77b6b9d8479c1825acccb381acb975a59d6d3e910e42e278aa54746019437009ceefd4ec23a564c76012d5bbfa002aea3f6558fe0f114de3b6ed421c6ca15a6e
-
SSDEEP
6144:Vw1eq6cfWJCQiOcLTwye/3TBqX0CYCz/Ju39pFCGLxWEk:6D6mjQijHwyk3Ts3YAJC/CCxWD
Malware Config
Signatures
Files
-
0ca4293b2ff3dadac0e7cb7b7164389740b9ee890a6ec606205c0bbb4218ec12.exe windows x86
f8d6ba60d4d4b8348415dcb2637b4219
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
FindNextFileW
FindClose
RemoveDirectoryW
CopyFileW
MoveFileExW
GetFileAttributesW
CreateDirectoryW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
ReadFile
CreateFileW
GetFileSizeEx
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
GetProcAddress
GetModuleHandleW
GetCurrentProcess
SetFileTime
GetStdHandle
VirtualQuery
SetUnhandledExceptionFilter
Sleep
EnterCriticalSection
LeaveCriticalSection
LocalFree
FormatMessageW
GetLocalTime
CreateProcessW
WaitForSingleObject
FindFirstFileW
CreateThread
TerminateProcess
SetFilePointerEx
CloseHandle
FlushInstructionCache
SetLastError
GetCurrentThreadId
RaiseException
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetModuleFileNameW
GetExitCodeProcess
GetTempPathW
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
FindResourceExW
FindResourceW
LoadResource
LockResource
GetLastError
SizeofResource
LocalAlloc
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
IsValidCodePage
GetOEMCP
GetACP
ExitProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapCreate
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InitializeCriticalSection
DeleteCriticalSection
InterlockedCompareExchange
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedIncrement
InterlockedDecrement
UnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleA
user32
MapWindowPoints
GetClientRect
SetWindowPos
GetWindowRect
GetMonitorInfoW
MonitorFromWindow
GetWindowLongW
GetWindow
LoadImageW
GetSystemMetrics
GetWindowTextLengthW
GetWindowTextW
GetDlgItem
UnregisterClassA
GetParent
LoadStringW
DialogBoxParamW
EndDialog
MessageBoxW
ShowWindow
WaitForInputIdle
SetWindowLongW
SendMessageW
gdi32
GetStockObject
shell32
CommandLineToArgvW
ShellExecuteW
wintrust
WinVerifyTrust
crypt32
CertCloseStore
CertFreeCertificateContext
CryptMsgClose
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
wininet
InternetConnectW
InternetReadFile
InternetOpenW
InternetOpenUrlW
InternetCrackUrlW
InternetCloseHandle
InternetQueryOptionW
InternetSetOptionW
HttpQueryInfoW
HttpOpenRequestW
HttpSendRequestW
rpcrt4
UuidCreateSequential
UuidToStringW
RpcStringFreeW
urlmon
ObtainUserAgentString
Sections
.text Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE