Static task
static1
Behavioral task
behavioral1
Sample
48743744280b16c9ba2b420395cdaa3a0904b21c5b21980e4dcff9c0486f5bbb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48743744280b16c9ba2b420395cdaa3a0904b21c5b21980e4dcff9c0486f5bbb.exe
Resource
win10v2004-20220901-en
General
-
Target
48743744280b16c9ba2b420395cdaa3a0904b21c5b21980e4dcff9c0486f5bbb
-
Size
2.0MB
-
MD5
0add0ec36c9d8afe9d376903dbcf66c0
-
SHA1
4e84bccb8d43ba5dc9c8d634e96a5a7095dde48d
-
SHA256
48743744280b16c9ba2b420395cdaa3a0904b21c5b21980e4dcff9c0486f5bbb
-
SHA512
30c6f008de53a624ecf09933f75271c868b09bcab2c74c9d14c2c23fa1b80367d63f62ec340358dc5a56e3e2436e39d379c53fd46557245d82da749cc35e470b
-
SSDEEP
24576:BcrYuZqBOgoz2kCxfAuI4LxpStYFBIFkjvqqADqMhNyLhSbpS76TdHBtXf9Nt+iV:Bcp5CPAr4V3jvAQ9SbpS76TnZ1V1Dz28
Malware Config
Signatures
Files
-
48743744280b16c9ba2b420395cdaa3a0904b21c5b21980e4dcff9c0486f5bbb.exe windows x86
4f66d4d063b088be5116c4f23f108fda
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
wininet
InternetSetOptionW
HttpOpenRequestW
InternetCloseHandle
kernel32
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
FindClose
GetSystemTimeAsFileTime
CreateDirectoryW
CreateFileW
GetFileAttributesW
FindFirstFileW
FindNextFileW
GetFileType
WaitForSingleObject
CreateMutexW
OpenMutexW
LocalFree
GetCurrentProcess
InitializeCriticalSection
DeleteCriticalSection
LoadLibraryA
FreeLibrary
TerminateProcess
GetVersion
LockFile
UnlockFile
LockFileEx
GetSystemTime
TlsAlloc
TlsGetValue
TlsSetValue
GetTempPathA
GetFullPathNameA
GetFullPathNameW
CreateFileA
GetFileAttributesA
DeleteFileA
DeleteFileW
AreFileApisANSI
InterlockedIncrement
InterlockedDecrement
GlobalAlloc
GlobalLock
GlobalUnlock
FlushInstructionCache
RaiseException
GetCurrentThreadId
GetExitCodeThread
MulDiv
lstrcmpW
FileTimeToSystemTime
DosDateTimeToFileTime
WritePrivateProfileStringW
HeapAlloc
WritePrivateProfileSectionW
CopyFileW
GlobalHandle
GlobalFree
lstrcmpiW
LoadLibraryExW
GetSystemDirectoryW
WriteFile
GetComputerNameW
GetStdHandle
QueryPerformanceCounter
GlobalMemoryStatus
GetVersionExA
FlushConsoleInputBuffer
UnhandledExceptionFilter
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
SetConsoleCtrlHandler
GetCommandLineW
ExitThread
CreateThread
GetModuleHandleExW
ExitProcess
IsDebuggerPresent
GetCPInfo
RtlUnwind
EncodePointer
GetStringTypeW
DecodePointer
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
InterlockedCompareExchange
HeapSize
CompareStringW
HeapReAlloc
HeapDestroy
GetFileSizeEx
GetFileSize
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetConsoleCP
SetFilePointerEx
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadConsoleW
SetStdHandle
OutputDebugStringW
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
GetDiskFreeSpaceW
GetTempPathW
FindResourceExW
FindResourceW
GetModuleHandleW
GetModuleFileNameW
LoadLibraryW
GetMailslotInfo
PeekNamedPipe
GetTimeZoneInformation
CloseHandle
SizeofResource
LeaveCriticalSection
EnterCriticalSection
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetVersionExW
GetModuleHandleA
SetLastError
GetCurrentProcessId
GetProcessHeap
GetVolumeInformationW
HeapFree
LoadResource
Sleep
GetLastError
OpenThread
OpenProcess
GetProcAddress
LockResource
InitializeCriticalSectionAndSpinCount
WriteConsoleW
SetEnvironmentVariableA
SetUnhandledExceptionFilter
TlsFree
GetStartupInfoW
GetPrivateProfileSectionW
user32
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DestroyAcceleratorTable
CreateAcceleratorTableW
SetTimer
ScreenToClient
SetWindowTextW
GetWindowTextLengthW
GetSysColor
FillRect
GetWindowLongW
SetWindowLongW
GetClassNameW
GetWindow
LoadCursorW
MapDialogRect
DialogBoxIndirectParamW
ReleaseCapture
SetCapture
GetClientRect
SetWindowContextHelpId
ClientToScreen
GetFocus
CharNextW
GetDlgItem
EndDialog
SetWindowPos
MoveWindow
DestroyWindow
IsChild
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
RegisterWindowMessageW
EnumWindows
GetWindowThreadProcessId
GetParent
GetDesktopWindow
GetWindowTextW
SetFocus
PostMessageW
SendMessageW
UnregisterClassW
GetActiveWindow
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
SendDlgItemMessageW
gdi32
GetObjectW
SelectObject
GetStockObject
GetDeviceCaps
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteObject
advapi32
RegDeleteValueW
AdjustTokenPrivileges
RegSetValueW
LookupAccountSidW
GetTokenInformation
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegQueryInfoKeyW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptImportKey
LookupAccountNameW
ConvertSidToStringSidW
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
DeregisterEventSource
ReportEventA
RegisterEventSourceA
LookupPrivilegeValueW
ole32
StringFromGUID2
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
OleLockRunning
CoTaskMemRealloc
CreateStreamOnHGlobal
CoTaskMemFree
oleaut32
VarUI4FromStr
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
VariantClear
VariantInit
SysStringLen
SysAllocStringLen
SysAllocString
SysFreeString
comctl32
InitCommonControlsEx
psapi
GetProcessImageFileNameW
EnumProcesses
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 304KB - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 467KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE