Static task
static1
Behavioral task
behavioral1
Sample
8447b697c5e4a051dc08e12b0b9796b71ed92a7248f417ea4aeab824a3dd195a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8447b697c5e4a051dc08e12b0b9796b71ed92a7248f417ea4aeab824a3dd195a.exe
Resource
win10v2004-20220812-en
General
-
Target
8447b697c5e4a051dc08e12b0b9796b71ed92a7248f417ea4aeab824a3dd195a
-
Size
210KB
-
MD5
07e6b8432982d29c5d8b57bfdd0a2500
-
SHA1
002ef1d236d16098127381a4458b146ff2230399
-
SHA256
8447b697c5e4a051dc08e12b0b9796b71ed92a7248f417ea4aeab824a3dd195a
-
SHA512
74b2632c1c6eb7fe446eba7027e4590f432d5ce66ebf8ee7c7bf8b23f624152f8472a524632ca717358d29a4008815346f7a75031996412ec16cff7329c3c5c8
-
SSDEEP
3072:1XAQZkhGvEK1q2BsSZ5oC90rH8Y5+7ZODZSLtA2tkn:1wQZkMvXezrtOODZq
Malware Config
Signatures
Files
-
8447b697c5e4a051dc08e12b0b9796b71ed92a7248f417ea4aeab824a3dd195a.exe windows x86
4b546d1788db35aa4c1441ccb7d5c9e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLOpenStreamA
URLOpenBlockingStreamA
UrlMkGetSessionOption
CopyStgMedium
ole32
CoMarshalInterThreadInterfaceInStream
CoAddRefServerProcess
CoQueryClientBlanket
OleQueryLinkFromData
CoGetClassObject
OleBuildVersion
advapi32
RegDeleteKeyA
AddAccessAllowedAce
SetSecurityDescriptorOwner
MakeAbsoluteSD
GetCurrentHwProfileW
CreateProcessAsUserA
OpenSCManagerA
SetThreadToken
GetFileSecurityA
CreateServiceW
gdi32
CreateColorSpaceA
AddFontResourceA
AnimatePalette
CloseFigure
CancelDC
AbortDoc
opengl32
glScaled
glGetPolygonStipple
glColor4fv
glTexEnvi
glColor3ubv
glNormal3dv
glRasterPos4f
wglUseFontOutlinesW
kernel32
GetStringTypeW
IsProcessorFeaturePresent
SetStdHandle
WriteConsoleW
HeapSize
CloseHandle
CreateFileW
GetCurrentProcess
MultiByteToWideChar
LCMapStringW
FlushFileBuffers
LoadLibraryW
GetConsoleMode
BuildCommDCBW
EnumSystemLanguageGroupsW
SetConsoleScreenBufferSize
ReadConsoleInputA
GetStdHandle
GetLastError
HeapReAlloc
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
SetFilePointer
GetConsoleCP
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oleoeax Size: 4KB - Virtual size: 80KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE