Static task
static1
Behavioral task
behavioral1
Sample
1d2bd1d8a6cd05e564ff57f0888fe184bf10d1fcd55da465855d13786f2bd061.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1d2bd1d8a6cd05e564ff57f0888fe184bf10d1fcd55da465855d13786f2bd061.exe
Resource
win10v2004-20220812-en
General
-
Target
1d2bd1d8a6cd05e564ff57f0888fe184bf10d1fcd55da465855d13786f2bd061
-
Size
197KB
-
MD5
ad961094872e7c34cac33d0a63f8a4db
-
SHA1
382c775d6bb02f6a27d668b87238531e456abe12
-
SHA256
1d2bd1d8a6cd05e564ff57f0888fe184bf10d1fcd55da465855d13786f2bd061
-
SHA512
2ed6266f190e022c56283ce069ab34b5d2d7821e61b047903632b668a8e85067898a45f2415caa2fe960c8c87f443577ee6eed9cd7dac8a273b2494337b15ab7
-
SSDEEP
3072:9IV58I0oMtw6z9nQAUPJ9Lx7X2AmdrJog7yWz9SjS5o:9IZt36zpUh9LZXQ5BG
Malware Config
Signatures
Files
-
1d2bd1d8a6cd05e564ff57f0888fe184bf10d1fcd55da465855d13786f2bd061.exe windows x86
62a71168fa167f50b4163163e0914820
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
CreateEventA
WaitForSingleObject
lstrlenA
CreateFileA
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
GetFileAttributesA
CreateDirectoryA
WriteFile
SetFileTime
GetTempPathA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetModuleFileNameA
GetModuleHandleA
GetSystemInfo
MultiByteToWideChar
lstrcpynA
GetVersionExA
FindFirstFileA
FindClose
GetFileSize
GetLocalTime
GetEnvironmentVariableA
CreateMutexA
GetCurrentProcess
GetCurrentProcessId
DeleteFileA
CreateProcessA
lstrcpyA
lstrcatA
DeviceIoControl
CreateNamedPipeA
ConnectNamedPipe
DisconnectNamedPipe
GetProcessHeap
SetEndOfFile
WriteConsoleW
LoadLibraryA
SetEvent
CloseHandle
UnmapViewOfFile
Sleep
OpenProcess
MapViewOfFile
CreateFileMappingA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
HeapReAlloc
LoadLibraryW
GetStringTypeW
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
GetTickCount
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
CreateFileW
FreeEnvironmentStringsW
HeapSize
GetModuleFileNameW
GetStdHandle
HeapCreate
ExitProcess
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
OpenEventA
GetLastError
ExitThread
GetCurrentThreadId
CreateThread
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
user32
wsprintfA
GetSystemMetrics
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyA
OpenProcessToken
ws2_32
recv
send
connect
recvfrom
sendto
closesocket
bind
htons
setsockopt
socket
WSACleanup
inet_ntoa
gethostbyname
gethostname
WSAStartup
shutdown
listen
accept
shlwapi
PathRemoveFileSpecA
PathFileExistsA
StrToIntA
wininet
InternetSetOptionA
InternetQueryOptionA
InternetReadFile
HttpAddRequestHeadersA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
HttpQueryInfoA
InternetQueryDataAvailable
InternetOpenA
HttpSendRequestA
urlmon
URLDownloadToFileA
psapi
GetProcessImageFileNameA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ