Static task
static1
Behavioral task
behavioral1
Sample
178bdfee5b5c44dd513379873438e3005d3dfa9c7e1a5660fff6c19fb61547bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
178bdfee5b5c44dd513379873438e3005d3dfa9c7e1a5660fff6c19fb61547bd.exe
Resource
win10v2004-20220812-en
General
-
Target
178bdfee5b5c44dd513379873438e3005d3dfa9c7e1a5660fff6c19fb61547bd
-
Size
425KB
-
MD5
0cad7ede1dc06735a97964432af8ef20
-
SHA1
42991e98113dc9f36a86557b558536179f730838
-
SHA256
178bdfee5b5c44dd513379873438e3005d3dfa9c7e1a5660fff6c19fb61547bd
-
SHA512
f1cf8db763e7dab738a6c8629a29dda7e5e413b31c2882d09020b1b89ba9d614adaf2cbc5c07b3fb5b036a56d5b5e05d0d75fc52547e283d5c7462d8e47e0fd4
-
SSDEEP
12288:UEUBwbQTSMb1Vi8/+wXzOFBe784GTocrIew6SqidmGJvC:wXbnzXzOWGljw6SzdmGJ
Malware Config
Signatures
Files
-
178bdfee5b5c44dd513379873438e3005d3dfa9c7e1a5660fff6c19fb61547bd.exe windows x86
6201c9b7837b9cdd20c413644e5b4793
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetGetConnectedStateExW
RetrieveUrlCacheEntryFileA
InternetReadFileExA
InternetUnlockRequestFile
FindNextUrlCacheEntryExA
FtpGetFileEx
GopherOpenFileA
GetUrlCacheGroupAttributeA
InternetTimeFromSystemTime
HttpQueryInfoW
InternetAutodial
InternetGetCookieW
GopherGetLocatorTypeW
InternetQueryDataAvailable
InternetGetLastResponseInfoW
InternetCheckConnectionW
InternetSetDialState
InternetSetFilePointer
gdi32
GetDeviceGammaRamp
user32
SetMessageExtraInfo
EnumPropsA
EndDeferWindowPos
DestroyCaret
GetUserObjectInformationA
SetClassLongA
BeginDeferWindowPos
GetSysColorBrush
VkKeyScanExA
wvsprintfW
GetClassInfoExA
UnhookWinEvent
DefDlgProcA
GetMenuInfo
ArrangeIconicWindows
InvalidateRgn
GetSysColor
InSendMessage
shell32
FreeIconList
SHEmptyRecycleBinW
ShellAboutW
SHAppBarMessage
SHLoadInProc
FindExecutableA
SHUpdateRecycleBinIcon
SheSetCurDrive
SHQueryRecycleBinW
SheChangeDirExW
SHGetMalloc
InternalExtractIconListW
SHQueryRecycleBinA
SHGetSpecialFolderLocation
RealShellExecuteA
DragAcceptFiles
ExtractIconExW
kernel32
SetUnhandledExceptionFilter
HeapReAlloc
GetModuleFileNameA
GetTickCount
RtlUnwind
IsValidLocale
LCMapStringW
GetDateFormatA
GetLastError
InterlockedDecrement
EnumSystemLocalesA
InterlockedIncrement
TlsFree
WriteFile
GetDriveTypeW
UnhandledExceptionFilter
WideCharToMultiByte
TlsSetValue
GetSystemDefaultLangID
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
SetEnvironmentVariableA
WaitForMultipleObjectsEx
GetCurrentProcessId
ExpandEnvironmentStringsW
GlobalFix
GetStringTypeW
LeaveCriticalSection
GetEnvironmentStringsW
GetModuleFileNameW
LoadLibraryA
FreeEnvironmentStringsW
IsDebuggerPresent
LCMapStringA
GetStartupInfoW
lstrcpynW
GetModuleHandleA
EnumCalendarInfoExA
GetCurrentThread
MultiByteToWideChar
GetCurrencyFormatW
GetLocaleInfoA
GetTimeZoneInformation
MapViewOfFileEx
SetLastError
WaitCommEvent
CompareStringW
VirtualAlloc
InterlockedExchange
GetProcAddress
CompareStringA
HeapFree
HeapAlloc
GetStdHandle
CreateNamedPipeW
FreeLibrary
OpenProcess
GetStartupInfoA
TerminateProcess
GetACP
SetCurrentDirectoryW
VirtualQuery
GetStringTypeExA
SetThreadAffinityMask
Sleep
GetCalendarInfoW
SetConsoleCtrlHandler
HeapSize
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
GetUserDefaultLCID
OpenEventA
GetTimeFormatA
HeapDestroy
GlobalGetAtomNameA
GetPrivateProfileStringA
OpenWaitableTimerA
GetStringTypeA
GetCurrentProcess
GetCurrentThreadId
EnterCriticalSection
GetCommandLineW
HeapCreate
ExitProcess
GetProcAddress
VirtualFree
QueryPerformanceCounter
TlsGetValue
DeleteCriticalSection
GetSystemTimeAsFileTime
SetHandleCount
GetFileType
GetModuleHandleW
comdlg32
ChooseFontW
ReplaceTextA
FindTextA
PageSetupDlgA
PageSetupDlgW
GetFileTitleA
GetFileTitleW
PrintDlgW
ChooseColorA
ChooseColorW
ChooseFontA
Sections
.text Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 279KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ