Static task
static1
Behavioral task
behavioral1
Sample
438de44abdd1a89fbdd49cb37aa128f0cb4bc951eca89b850bd6d31f545571dc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
438de44abdd1a89fbdd49cb37aa128f0cb4bc951eca89b850bd6d31f545571dc.exe
Resource
win10v2004-20220812-en
General
-
Target
438de44abdd1a89fbdd49cb37aa128f0cb4bc951eca89b850bd6d31f545571dc
-
Size
176KB
-
MD5
083842ada9573818eb34522949d44c18
-
SHA1
db9940e0ff5eb8a687d80c48b067a7da1b80df3f
-
SHA256
438de44abdd1a89fbdd49cb37aa128f0cb4bc951eca89b850bd6d31f545571dc
-
SHA512
bcf22a4db08be55c8c886ff9053cf6dcea7c318f71132bf8e58fd3dbc11901e29e00a5dc0e9c6ef67c616789622522082dc5619b226e4a02314e46f48ce6c0f2
-
SSDEEP
3072:AoFvujbjlMi1RTGCA/bziy9tvzhir77uyeTZPh6GHYJsaM7d0:FFvuvjlM4T6bziyjvzMdethd4JZMp0
Malware Config
Signatures
Files
-
438de44abdd1a89fbdd49cb37aa128f0cb4bc951eca89b850bd6d31f545571dc.exe windows x86
804dbd9b867c5c47071c57553373edd2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
LoadLibraryW
GetProcAddress
GetTickCount
GetModuleHandleW
GetFileAttributesW
MoveFileExW
CreateThread
InitializeCriticalSection
EnterCriticalSection
GetLocalTime
LeaveCriticalSection
GetLogicalDriveStringsW
QueryDosDeviceW
GetFullPathNameW
GetLongPathNameW
TerminateProcess
GetVersionExW
GetVolumeInformationW
CreateFileW
DeleteFileW
GetComputerNameW
GetVolumePathNameW
GetModuleFileNameA
GetCurrentThread
ExpandEnvironmentStringsW
WriteConsoleW
GetStringTypeW
LCMapStringW
GetProcessHeap
SetEndOfFile
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
IsValidCodePage
GetOEMCP
Sleep
WriteFile
ReadFile
GetFileSize
GetTempPathW
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
GetModuleFileNameW
WaitForSingleObject
SetFileAttributesW
SetUnhandledExceptionFilter
SetErrorMode
LocalFree
GetLastError
GetCommandLineW
CloseHandle
CreateProcessW
GetCurrentProcessId
GetEnvironmentVariableW
ExitProcess
GetCurrentProcess
GetACP
GetCPInfo
HeapReAlloc
GetSystemTimeAsFileTime
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetEnvironmentStringsW
FreeEnvironmentStringsW
DeleteCriticalSection
GetFileType
SetHandleCount
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetStdHandle
HeapSize
HeapCreate
HeapFree
EncodePointer
DecodePointer
HeapAlloc
HeapSetInformation
GetStartupInfoW
RaiseException
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
user32
CharLowerW
CharLowerA
CharUpperW
GetSystemMetrics
advapi32
LookupPrivilegeValueW
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
ConvertSidToStringSidW
LookupAccountNameW
GetNamedSecurityInfoW
AdjustTokenPrivileges
CopySid
GetLengthSid
GetTokenInformation
OpenProcessToken
SetNamedSecurityInfoW
EqualSid
RegEnumValueW
RegQueryInfoKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
SHGetFolderPathW
CommandLineToArgvW
ole32
CoTaskMemFree
CoCreateGuid
wininet
InternetSetOptionW
InternetOpenUrlW
InternetCloseHandle
HttpQueryInfoA
InternetOpenW
psapi
EnumProcessModules
GetModuleInformation
dbghelp
SymGetModuleBase64
SymFunctionTableAccess64
StackWalk64
SymInitialize
SymSetOptions
SymLoadModule64
SymFromAddr
SymGetLineFromAddr64
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ