Static task
static1
Behavioral task
behavioral1
Sample
744722e9db4766b32b5700162c9ab2051d99328eddcd684c4d2b64b39de161d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
744722e9db4766b32b5700162c9ab2051d99328eddcd684c4d2b64b39de161d6.exe
Resource
win10v2004-20220901-en
General
-
Target
744722e9db4766b32b5700162c9ab2051d99328eddcd684c4d2b64b39de161d6
-
Size
334KB
-
MD5
809b137c63b89078335b4a266f4d5c60
-
SHA1
3f594ac532c9816c89b7cca33e72518290caa09b
-
SHA256
744722e9db4766b32b5700162c9ab2051d99328eddcd684c4d2b64b39de161d6
-
SHA512
f4139b72f8a91e8643212904f18b91037c53f32fcd7855d61dc657a92d8f1dbbfb85188907c6da2dfde98337285c0f66ee277dce1d5a127185efa659ff11d5fe
-
SSDEEP
6144:IN78mM9eujiw4L7Yj9OBVHgL0ZrGg+i9HpXOmTnpE:Il9M9eujiw4vYOL+09RG
Malware Config
Signatures
Files
-
744722e9db4766b32b5700162c9ab2051d99328eddcd684c4d2b64b39de161d6.exe windows x86
435e5031afa548ef44bf6e452d2711ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateToolhelp32Snapshot
Module32FirstW
GetWindowsDirectoryW
Module32NextW
Process32FirstW
Process32NextW
OpenProcess
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
GetCurrentThreadId
WideCharToMultiByte
GetModuleHandleW
GetVersionExW
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
CreateFileW
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
FreeLibrary
CreateFileA
GetProcessHeap
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
InitializeCriticalSectionAndSpinCount
LoadLibraryA
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
VirtualAlloc
CreateEventW
DeleteFileW
GetModuleFileNameW
GetSystemDirectoryW
GetTempPathW
GetTickCount
LoadLibraryW
CloseHandle
GetCurrentProcess
GetCurrentProcessId
GetFileAttributesW
Sleep
CreateThread
GetProcAddress
WriteFile
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
HeapCreate
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetConsoleMode
GetConsoleCP
DeleteCriticalSection
GetStartupInfoA
GetStartupInfoW
HeapFree
HeapAlloc
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
user32
TranslateMessage
DispatchMessageW
LoadIconW
TranslateAcceleratorW
RegisterClassExW
CreateWindowExW
DefWindowProcW
BeginPaint
GetMessageW
LoadCursorW
LoadBitmapW
GetSystemMetrics
GetWindowDC
PrintWindow
SetCursorPos
SendInput
GetWindowTextW
WindowFromPoint
GetWindowRect
FindWindowW
PostQuitMessage
EndPaint
gdi32
GetBitmapBits
GetObjectW
DeleteObject
GetDIBits
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
BitBlt
DeleteDC
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ws2_32
WSAStartup
socket
gethostbyname
inet_addr
gethostbyaddr
htons
connect
closesocket
send
recv
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ