Static task
static1
Behavioral task
behavioral1
Sample
da847e372d363949c5af8fd32ae19dde128355df5ff6296b9b284822d0311eda.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da847e372d363949c5af8fd32ae19dde128355df5ff6296b9b284822d0311eda.exe
Resource
win10v2004-20220901-en
General
-
Target
da847e372d363949c5af8fd32ae19dde128355df5ff6296b9b284822d0311eda
-
Size
336KB
-
MD5
a67f2f5b9c499fa7d33c1163a9f03a70
-
SHA1
a8efdc596d66b7cb123c47a25c6e716bbb9bff48
-
SHA256
da847e372d363949c5af8fd32ae19dde128355df5ff6296b9b284822d0311eda
-
SHA512
7c1e8de4ca0e2bee52f6512362a6c4f7efceeb1201bdcadb465bd0e0349aec76e55fde99ab8ebab66a16197fbc56f77da3ecfa03b760f2dc7ef2c5a520037fda
-
SSDEEP
6144:8Hl76WZhUlw/l3NLDz3aDyKKww84F8/5DUlDBRMl9G9C/QAYlU/p+OD3Xrnud8Wz:cTrkuM8m6kU4F3fg/
Malware Config
Signatures
Files
-
da847e372d363949c5af8fd32ae19dde128355df5ff6296b9b284822d0311eda.exe windows x86
a48eabb60054ab9bb1ad5cbf131200b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
CommandLineToArgvW
ShellExecuteExA
ShellExecuteW
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
iphlpapi
GetAdaptersInfo
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameW
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoInitialize
CoUninitialize
kernel32
GetConsoleCP
GetStringTypeW
GetConsoleMode
SetFilePointerEx
SetEnvironmentVariableA
EnterCriticalSection
SetEndOfFile
CreateFileW
WriteConsoleW
ReadConsoleW
ReadFile
SetStdHandle
GetCommandLineW
ExpandEnvironmentStringsW
CreateDirectoryA
WaitForSingleObject
Sleep
GetCurrentProcessId
CreateThread
GetModuleFileNameW
CopyFileExA
HeapAlloc
HeapFree
GetProcessHeap
MoveFileExW
GetVolumeInformationW
GetSystemDirectoryW
GetLastError
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetVersionExA
GetWindowsDirectoryA
GetVolumeInformationA
GetWindowsDirectoryW
lstrcpyA
GetCurrentThreadId
GetSystemTime
GetLocalTime
GetVersionExW
lstrcatA
CreateFileA
WriteFile
CloseHandle
HeapReAlloc
SwitchToThread
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
LocalFree
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
LeaveCriticalSection
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapSize
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
CompareStringW
LCMapStringW
FlushFileBuffers
winhttp
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
user32
wsprintfW
GetDesktopWindow
GetForegroundWindow
GetMessageTime
GetSysColor
Sections
.text Size: 277KB - Virtual size: 277KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ