Static task
static1
Behavioral task
behavioral1
Sample
412d2e24e7d714e7b4083b8709e74746a5bc474493276e82a37c6ee6e079875a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
412d2e24e7d714e7b4083b8709e74746a5bc474493276e82a37c6ee6e079875a.exe
Resource
win10v2004-20220901-en
General
-
Target
412d2e24e7d714e7b4083b8709e74746a5bc474493276e82a37c6ee6e079875a
-
Size
324KB
-
MD5
808efab04505676d37ecbd1bcd2d1856
-
SHA1
333c0ad6f414368fa343b1b7f38ec6e76095375a
-
SHA256
412d2e24e7d714e7b4083b8709e74746a5bc474493276e82a37c6ee6e079875a
-
SHA512
5e98918fdf97dde3bce8da65f36b1821f64bbe72045c7c828bbe1d3e8e0edcd111b590bf1dbe56444926eaa0291d07385d1026a256e3aecd87e934328ab3d219
-
SSDEEP
6144:XPsibXLDW+/1xC+Jm7jSpElskKWugvfNlPfA63m1Dfa:fsc3W+DC+ZUfKWTXjf33mV
Malware Config
Signatures
Files
-
412d2e24e7d714e7b4083b8709e74746a5bc474493276e82a37c6ee6e079875a.exe windows x86
c15777a127783441c4f2a710a0815000
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoInitialize
CoUninitialize
CoCreateInstance
OleInitialize
OleSetContainedObject
OleUninitialize
ws2_32
WSAStartup
WSACleanup
WSACloseEvent
WSAConnect
WSAAddressToStringA
usp10
ScriptBreak
ScriptCPtoX
ScriptCacheGetHeight
ScriptFreeCache
ScriptGetCMap
ScriptGetFontProperties
ScriptGetGlyphABCWidth
ScriptGetLogicalWidths
ScriptGetProperties
ScriptIsComplex
ScriptItemize
ScriptJustify
ScriptLayout
ScriptPlace
ScriptRecordDigitSubstitution
ScriptShape
ScriptStringAnalyse
ScriptStringCPtoX
ScriptStringFree
ScriptStringGetLogicalWidths
ScriptStringGetOrder
ScriptStringOut
ScriptStringValidate
ScriptStringXtoCP
ScriptString_pLogAttr
kernel32
TerminateProcess
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
MultiByteToWideChar
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
Sleep
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
InterlockedDecrement
CreateProcessA
GetDiskFreeSpaceA
GetCurrentThreadId
CreateEventA
GetVersion
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
RemoveDirectoryA
TlsSetValue
TlsAlloc
GetProcAddress
LoadLibraryA
SetTapeParameters
GetSystemDirectoryA
LocalAlloc
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsFree
InterlockedIncrement
SetLastError
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 728KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ