Static task
static1
Behavioral task
behavioral1
Sample
c944b0f63ed2d3509682f50da890d4ffb41ebd1ba13d283cc2693c10679a76c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c944b0f63ed2d3509682f50da890d4ffb41ebd1ba13d283cc2693c10679a76c9.exe
Resource
win10v2004-20220901-en
General
-
Target
c944b0f63ed2d3509682f50da890d4ffb41ebd1ba13d283cc2693c10679a76c9
-
Size
102KB
-
MD5
55f899e21934c8fe77db576810c9b630
-
SHA1
a61980880a217aee1f6bee36c2e4da2ed1b11600
-
SHA256
c944b0f63ed2d3509682f50da890d4ffb41ebd1ba13d283cc2693c10679a76c9
-
SHA512
706195a9f81a2cf09043a84e09e7a9bd4be9c6ca23cba97b6d44b8d9f9babda2a1cb123cace83afa3cf9ca3c263ed8e2deffab66184bda496d645ab61912aaa1
-
SSDEEP
3072:pT120wXcSpXykelaU/+Un9Cr0rCQViG5RV:pT12l5yXoQrCivV
Malware Config
Signatures
Files
-
c944b0f63ed2d3509682f50da890d4ffb41ebd1ba13d283cc2693c10679a76c9.exe windows x86
f0669f2e26df8948d23ee6ace150fe3b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalAlloc
GetVersionExA
SetFileTime
GetFileTime
CreateFileA
GetCurrentProcess
Process32Next
OpenProcess
Process32First
TerminateProcess
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
SetCurrentDirectoryA
CopyFileA
DeleteFileA
LoadLibraryA
GetProcAddress
GetCurrentDirectoryA
WriteFile
CreatePipe
CreateProcessA
CreateThread
ExitProcess
ReadFile
Sleep
PeekNamedPipe
CloseHandle
HeapSize
GetProcessHeap
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
RaiseException
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
SetStdHandle
ExitThread
GetTickCount
GetLastError
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidCodePage
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
RtlUnwind
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
SetFilePointer
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
user32
wsprintfA
advapi32
SetThreadToken
RegEnumKeyExA
RegQueryInfoKeyA
DuplicateTokenEx
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CreateProcessAsUserA
wininet
InternetCloseHandle
InternetOpenA
HttpSendRequestA
InternetConnectA
HttpOpenRequestA
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
ws2_32
inet_ntoa
gethostbyname
WSAStartup
gethostname
ntohs
netapi32
Netbios
mpr
WNetCloseEnum
WNetEnumResourceA
WNetOpenEnumA
iphlpapi
GetTcpTable
GetUdpTable
psapi
EnumProcessModules
GetModuleBaseNameA
GetModuleFileNameExA
EnumProcesses
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ