Static task
static1
Behavioral task
behavioral1
Sample
d5d5ec526e79fa90cecf05886043c4ed8c13a680e3d94c1198381b90bb65eacd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5d5ec526e79fa90cecf05886043c4ed8c13a680e3d94c1198381b90bb65eacd.exe
Resource
win10v2004-20220812-en
General
-
Target
d5d5ec526e79fa90cecf05886043c4ed8c13a680e3d94c1198381b90bb65eacd
-
Size
1.0MB
-
MD5
90832a26af8fefc3ee52477be887841d
-
SHA1
6095edd1ceedf4f025f67b4a7a5798a42c3a370e
-
SHA256
d5d5ec526e79fa90cecf05886043c4ed8c13a680e3d94c1198381b90bb65eacd
-
SHA512
40d38afdfc166439f040cb67aaf8bf175f73f573bad756046adf83c343887f537cdc1518018fa73cfa231770766050a2d978256057f1ac9ea36e6cf77f8d0fbc
-
SSDEEP
24576:tN93Yen+udEEdODOqWmStee0e5Q7SBP67tzsPVgn:tN93F+udDODOqWjteu5Q7SBP674V0
Malware Config
Signatures
Files
-
d5d5ec526e79fa90cecf05886043c4ed8c13a680e3d94c1198381b90bb65eacd.exe windows x86
51de603aae24205594e607b11d311f49
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCrackUrlW
kernel32
GetCommandLineW
OpenEventW
GetCurrentProcessId
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetLocaleInfoW
GetUserDefaultUILanguage
SetEnvironmentVariableW
GetEnvironmentVariableW
OpenMutexW
SetEvent
CreateEventW
CreateThread
GetCurrentThreadId
Sleep
WaitForSingleObject
GetTempPathW
OpenProcess
CreateProcessW
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
GetThreadLocale
LockResource
WTSGetActiveConsoleSessionId
InterlockedDecrement
InterlockedIncrement
CloseHandle
lstrcmpiW
GetModuleHandleW
HeapCreate
IsProcessorFeaturePresent
LCMapStringW
GetCPInfo
RtlUnwind
GetProcessHeap
GetConsoleMode
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
FreeEnvironmentStringsW
ExpandEnvironmentStringsW
SetEnvironmentVariableA
CompareStringW
CreateFileA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
WriteConsoleW
GetTimeZoneInformation
GetStringTypeW
GetFileType
SetHandleCount
LocalAlloc
LocalFree
InterlockedExchange
LoadLibraryA
IsDebuggerPresent
GetCurrentProcess
DuplicateHandle
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
WriteFile
GetFileAttributesW
ReadFile
CreateFileW
GetCurrentDirectoryW
SetLastError
CreateFileMappingW
GetFileTime
SetUnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
VirtualQueryEx
AssignProcessToJobObject
GetExitCodeProcess
TerminateProcess
GetStdHandle
GetProcessId
HeapSetInformation
ResumeThread
GetConsoleCP
GetUserDefaultLangID
InterlockedCompareExchange
CreateMutexW
SetFilePointer
FormatMessageA
GetModuleHandleA
ReleaseMutex
SetEndOfFile
FlushFileBuffers
QueryPerformanceCounter
GetNativeSystemInfo
GetVersionExW
GetSystemDirectoryW
GetWindowsDirectoryW
InterlockedExchangeAdd
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
RtlCaptureContext
LoadLibraryW
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GlobalLock
GlobalUnlock
GetPrivateProfileStringW
WideCharToMultiByte
EncodePointer
DecodePointer
HeapAlloc
HeapFree
UnhandledExceptionFilter
GetStartupInfoW
ExitProcess
HeapReAlloc
GetEnvironmentStringsW
user32
GetSystemMetrics
GetWindowThreadProcessId
RegisterClipboardFormatW
IsImmersiveProcess
AllowSetForegroundWindow
CharNextW
MessageBoxW
PostThreadMessageW
GetMessageW
FindWindowExW
GetAsyncKeyState
CharUpperW
DispatchMessageW
TranslateMessage
advapi32
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
CreateProcessAsUserW
ConvertSidToStringSidW
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
GetFileSecurityW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
ole32
CoTaskMemAlloc
CoTaskMemRealloc
ReleaseStgMedium
CoCreateInstance
StringFromGUID2
CoSetProxyBlanket
CoAddRefServerProcess
CoReleaseServerProcess
CoResumeClassObjects
CoTaskMemFree
CoUninitialize
CoRegisterClassObject
CoInitializeEx
CoRevokeClassObject
oleaut32
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
VarUI4FromStr
SysFreeString
VariantClear
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
winmm
timeGetTime
shlwapi
PathFileExistsA
PathIsUNCA
UrlCreateFromPathA
UrlCreateFromPathW
PathRemoveExtensionW
PathFindFileNameW
PathIsUNCW
PathFileExistsW
PathFindExtensionW
wtsapi32
WTSQueryUserToken
Sections
.text Size: 528KB - Virtual size: 527KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 287KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE