Static task
static1
Behavioral task
behavioral1
Sample
2a30d7b76e3dcc10861526f83fb060a12485a974626bea8872cf2a012e25333a_unpacked.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2a30d7b76e3dcc10861526f83fb060a12485a974626bea8872cf2a012e25333a_unpacked.exe
Resource
win10v2004-20220812-en
General
-
Target
2a30d7b76e3dcc10861526f83fb060a12485a974626bea8872cf2a012e25333a_unpacked
-
Size
69KB
-
MD5
0799d9701fdee9fa2005e63325e9ff82
-
SHA1
f5efec17f17e932b39f18c10fa5bc05163c5b88a
-
SHA256
7bd6791872fae01c542caff4b157ad1af8a3e5db0232af58a64be950b8fc64bd
-
SHA512
261dcc04963bd817b6f7a9e125a6944f66a5f091d954f9d24ea5bf89034574e75bb8f4003798f5399cb4e3d4cc0904e99a0eb2412ea5b8a8528c4237d8402a4f
-
SSDEEP
1536:/s9fQZTinTxSpCS6bMBPH/Hoaekcdnef7Eoq52Gg:/l5inNSprwy/HoapcdezZq52Gg
Malware Config
Signatures
Files
-
2a30d7b76e3dcc10861526f83fb060a12485a974626bea8872cf2a012e25333a_unpacked.exe windows x86
43ab184dd143796a35f8d469867b1832
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
psapi
EnumProcessModules
GetModuleFileNameExA
GetProcessImageFileNameA
userenv
GetAllUsersProfileDirectoryA
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetOpenUrlA
InternetQueryOptionA
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetOptionA
ws2_32
WSACleanup
WSAStartup
inet_ntoa
setsockopt
closesocket
connect
gethostbyname
htons
socket
shlwapi
wnsprintfA
StrStrIA
StrStrA
kernel32
GetSystemDirectoryA
GetVolumeInformationA
WideCharToMultiByte
SystemTimeToFileTime
GetProcAddress
GetCurrentProcess
GetVersionExA
GetSystemInfo
CreateThread
lstrcpyA
SetFileAttributesA
CopyFileA
lstrcmpiA
GetEnvironmentVariableA
lstrlenA
Sleep
HeapFree
HeapAlloc
GetProcessHeap
VirtualAlloc
CloseHandle
OpenProcess
Process32Next
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
CreateProcessA
WaitForSingleObject
ResumeThread
SetThreadContext
GetThreadContext
WriteProcessMemory
TerminateProcess
VirtualAllocEx
VirtualFree
lstrcatA
CreateRemoteThread
GetLastError
lstrcmpA
lstrcpynA
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
VirtualQuery
ExitProcess
SetUnhandledExceptionFilter
DeleteCriticalSection
WaitForMultipleObjects
LeaveCriticalSection
ResetEvent
TerminateThread
EnterCriticalSection
CreateEventA
InitializeCriticalSection
SetEvent
GetTickCount
MultiByteToWideChar
GlobalMemoryStatus
GetCurrentThreadId
CreateMutexA
WriteFile
GetTempFileNameA
GetLocalTime
GetExitCodeProcess
QueryPerformanceCounter
user32
wsprintfA
GetSystemMetrics
CharUpperA
advapi32
RegDeleteValueA
RegSetValueExA
OpenProcessToken
GetTokenInformation
CreateWellKnownSid
EqualSid
CryptEncrypt
RegOpenKeyExA
CryptReleaseContext
CryptGenKey
CryptExportKey
CryptImportKey
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDecrypt
CryptDestroyKey
CryptGetHashParam
CryptDestroyHash
ole32
CoInitialize
CoTaskMemFree
StringFromCLSID
CoUninitialize
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ