Static task
static1
Behavioral task
behavioral1
Sample
375d6c12cc3b6d57316eb5eadd1d3f7b6bac0b02049bbe5711354afabbd1c09a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
375d6c12cc3b6d57316eb5eadd1d3f7b6bac0b02049bbe5711354afabbd1c09a.exe
Resource
win10v2004-20220901-en
General
-
Target
375d6c12cc3b6d57316eb5eadd1d3f7b6bac0b02049bbe5711354afabbd1c09a
-
Size
120KB
-
MD5
762a2f858bcf2a314b7a39e5cfd81886
-
SHA1
3ab9e36192c44bf8605c7a8ff12a9c8e35b0768e
-
SHA256
375d6c12cc3b6d57316eb5eadd1d3f7b6bac0b02049bbe5711354afabbd1c09a
-
SHA512
f11bb357ceaa286b637a21d8f4794e5fd7d29d7f2a108baac7e45da649e6e4c1ca56d90f7b07c9bfa9ec15d2c5b303c9fc97e7a0bde8cc9dfe974788ba90bbb8
-
SSDEEP
1536:c/AHSDmzeN1q89S4AANJW1v1uKupMl3NpaJoV0bslKDo9PIvNCXWGAJ+bXuZbn:ChWuw+bWvHliJoGIlKD4AFGmSu
Malware Config
Signatures
Files
-
375d6c12cc3b6d57316eb5eadd1d3f7b6bac0b02049bbe5711354afabbd1c09a.exe windows x86
56a46e4e1c9b1e2ee8473b88d899cd41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
ws2_32
connect
socket
closesocket
gethostbyname
send
recv
WSAStartup
htonl
htons
ntohl
kernel32
FindNextFileW
FindClose
MoveFileW
GetFileSizeEx
GetModuleFileNameW
GetFileAttributesW
ExitProcess
GetCommandLineW
GetComputerNameA
CreateMutexW
lstrlenA
CreateProcessW
GetCurrentProcess
SetHandleInformation
WaitForSingleObject
GetComputerNameW
GetLogicalDrives
GetModuleHandleW
GetTickCount
DeleteFileW
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
Sleep
LeaveCriticalSection
ReadFile
CreateFileW
lstrlenW
OpenMutexW
GetProcAddress
EnterCriticalSection
WaitForMultipleObjects
CreatePipe
lstrcmpiW
DeleteCriticalSection
ReleaseMutex
CloseHandle
GetVersion
CreateThread
ExpandEnvironmentStringsW
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentProcessId
SetFileAttributesW
GetVolumeInformationW
WriteFile
SetFilePointerEx
SetEndOfFile
FindFirstFileW
CompareStringW
GetProcessHeap
HeapReAlloc
HeapAlloc
HeapFree
advapi32
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
OpenProcessToken
user32
SystemParametersInfoW
shell32
ShellExecuteExW
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE