Static task
static1
Behavioral task
behavioral1
Sample
b8928e2a7a1995047ba33397dc028ad195d0fa8b3264c2887b48eccd1374e721_unpacked.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b8928e2a7a1995047ba33397dc028ad195d0fa8b3264c2887b48eccd1374e721_unpacked.exe
Resource
win10v2004-20220812-en
General
-
Target
b8928e2a7a1995047ba33397dc028ad195d0fa8b3264c2887b48eccd1374e721_unpacked
-
Size
47KB
-
MD5
53ae381b54c74bba6df118ea3d6b4eed
-
SHA1
7720c718c112d0025b334baccc135de0e2f1212c
-
SHA256
b8928e2a7a1995047ba33397dc028ad195d0fa8b3264c2887b48eccd1374e721
-
SHA512
1c0af15dd4027442993d738d4d71e54fba6e376e816a08d12e661dc02b7dcd9a00088b4d5872d2eb39947882cca585644c1d8d9366f85aeb1b50aae0c8a8836b
-
SSDEEP
768:BgIsfwd2aMmAVJZi60wOkA0otA62dIwJ4uEPIpbevG0hKsC5iOI0tzkAD4+SI:q9YMh4Fku+62d/QggG00q0tzkAD4+S
Malware Config
Signatures
Files
-
b8928e2a7a1995047ba33397dc028ad195d0fa8b3264c2887b48eccd1374e721_unpacked.exe windows x86
78a371b58830de508132245e07fe6ef8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcessModules
GetModuleFileNameExA
GetProcessImageFileNameA
userenv
GetAllUsersProfileDirectoryA
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
HttpSendRequestA
InternetReadFile
InternetSetOptionA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetQueryOptionA
InternetCrackUrlA
InternetOpenA
InternetConnectA
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
socket
shlwapi
wnsprintfA
kernel32
SystemTimeToFileTime
lstrcpynA
WaitForSingleObject
CreateEventA
GetSystemDirectoryA
GetVolumeInformationA
Sleep
CreateThread
CopyFileA
lstrcpyA
lstrcmpiA
GetEnvironmentVariableA
lstrlenA
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
OpenProcess
Process32Next
GetCurrentProcessId
CloseHandle
Process32First
CreateToolhelp32Snapshot
CreateProcessA
VirtualAlloc
ResumeThread
SetThreadContext
GetThreadContext
WriteProcessMemory
TerminateProcess
VirtualAllocEx
VirtualFree
lstrcatA
CreateRemoteThread
GetVersionExA
ReadFile
GetFileSize
CreateFileA
CreateMutexA
GetModuleFileNameA
GetLocalTime
QueryPerformanceCounter
ExitProcess
WriteFile
GetTempFileNameA
GetTickCount
TerminateThread
GetExitCodeProcess
GetExitCodeThread
SetUnhandledExceptionFilter
GetCurrentProcess
GetProcAddress
GetModuleHandleA
SetEvent
GetSystemInfo
WideCharToMultiByte
user32
wsprintfA
GetSystemMetrics
advapi32
CryptDestroyHash
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
OpenProcessToken
RegQueryValueExA
CryptReleaseContext
GetTokenInformation
CreateWellKnownSid
EqualSid
CryptCreateHash
CryptHashData
CryptGetHashParam
RegCloseKey
CryptDecrypt
CryptEncrypt
CryptAcquireContextA
CryptGenKey
CryptExportKey
CryptDestroyKey
CryptImportKey
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
StringFromCLSID
CoCreateInstance
Sections
.text Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ