Static task
static1
Behavioral task
behavioral1
Sample
46e4e990d9a5ba425d0b722d9133aa622c612b16089984cd33fe95dbd65f6130.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46e4e990d9a5ba425d0b722d9133aa622c612b16089984cd33fe95dbd65f6130.exe
Resource
win10v2004-20220812-en
General
-
Target
46e4e990d9a5ba425d0b722d9133aa622c612b16089984cd33fe95dbd65f6130
-
Size
416KB
-
MD5
006b6ce350fa4f4e2e5a17ae6324bb10
-
SHA1
573b0f1cd05ad47b56aa1bf5c06bf31ff32c7c32
-
SHA256
46e4e990d9a5ba425d0b722d9133aa622c612b16089984cd33fe95dbd65f6130
-
SHA512
59d7965d354d8c325850cba8ebd22b69f20c5c4ab92e53d43bdc7e74d8edb18ae5cd344bead30ea7e6e4da28ccd02b2c11ae81b8066ec2a8f21daf99cc0eb95b
-
SSDEEP
6144:JwRZ4Q0sxR3A2eLQroZqcBikCz0g98FO7Iz5LJTBYJYHWGyEd+1AOJGnzo0naGT:YZ9nA1wc0kCwKUOE+2HWhEd+1KnPaGT
Malware Config
Signatures
Files
-
46e4e990d9a5ba425d0b722d9133aa622c612b16089984cd33fe95dbd65f6130.exe windows x86
8cb366850142084202bb59e5cb8a801c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetCurrentProcessId
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
CreateFileA
WriteFile
CloseHandle
ReadFile
SetFilePointer
GetCurrentThreadId
CreateThread
WaitForSingleObject
SetThreadPriority
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetLastError
CreateMutexA
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
HeapFree
SetUnhandledExceptionFilter
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
InterlockedExchange
VirtualQuery
LoadLibraryA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
VirtualProtect
GetSystemInfo
GetTickCount
user32
GetDesktopWindow
LoadIconA
RegisterClassA
MessageBoxA
GetForegroundWindow
SetWindowPos
SetWindowLongA
GetSystemMetrics
GetWindowRect
SystemParametersInfoA
AdjustWindowRectEx
GetMenu
SetRect
ShowWindow
GetWindowLongA
ClientToScreen
GetClientRect
UnhookWindowsHookEx
CallNextHookEx
GetKeyState
SetWindowsHookExA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
TranslateAcceleratorA
LoadAcceleratorsA
DefWindowProcA
TrackMouseEvent
SetCursor
LoadCursorA
PostQuitMessage
ShowCursor
UpdateWindow
CreateWindowExA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
ole32
CoInitialize
dsound
ord1
ddraw
DirectDrawCreateEx
wininet
HttpAddRequestHeadersA
HttpOpenRequestA
HttpSendRequestA
InternetQueryDataAvailable
InternetReadFile
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetSetOptionA
gdi32
TextOutA
CreatePen
SelectObject
SetTextColor
GetStockObject
SetBkMode
LineTo
MoveToEx
DeleteObject
Sections
.text Size: 276KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ