Static task
static1
Behavioral task
behavioral1
Sample
4a83d4fb4f39b314d6dd6e0ec4f6c1c40b444a0c4498be6c4ca9fce5b19eb075.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a83d4fb4f39b314d6dd6e0ec4f6c1c40b444a0c4498be6c4ca9fce5b19eb075.exe
Resource
win10v2004-20220812-en
General
-
Target
4a83d4fb4f39b314d6dd6e0ec4f6c1c40b444a0c4498be6c4ca9fce5b19eb075
-
Size
212KB
-
MD5
0f909c0e462f4f62c1a7f8b273de5910
-
SHA1
5807a65d2271d811f42affd0ff2cda1e9bce7a18
-
SHA256
4a83d4fb4f39b314d6dd6e0ec4f6c1c40b444a0c4498be6c4ca9fce5b19eb075
-
SHA512
ca9d6381a5fda0303723464a48a5d762d703e48c08b33cd8bd0a94e80c1ab28d4e153dada6a7800e2a38bc1fa07e479e27bad35e0e3f59fe62a77e4399e70bb4
-
SSDEEP
3072:YSo1t6sVZgQQ3T8HUkEt0+bvNIRxki7y2Gm4zL4njjlnQ7wLt3bf:YjUkZgJDLztlbHi7y2eIVnrbf
Malware Config
Signatures
Files
-
4a83d4fb4f39b314d6dd6e0ec4f6c1c40b444a0c4498be6c4ca9fce5b19eb075.exe windows x86
fb7426b66ae24f053b9af0d38965fafb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
lstrcmpiA
GetFileAttributesA
GetFileSize
GetFileTime
lstrcatA
TlsAlloc
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetVersion
lstrcmpA
GetCurrentThreadId
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
ExitProcess
RtlUnwind
UnlockFile
GetSystemTime
GetCommandLineA
RaiseException
SetStdHandle
GetACP
HeapSize
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetStartupInfoA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
LockFile
FlushFileBuffers
lstrlenA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
ReleaseMutex
OpenFileMappingA
GetEnvironmentVariableA
GetShortPathNameA
SetPriorityClass
ResumeThread
LocalAlloc
CreateMutexA
FreeLibrary
LoadLibraryA
GetProcAddress
OutputDebugStringA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
FormatMessageA
LocalFree
SetLastError
SetFileAttributesA
WriteFile
LocalFileTimeToFileTime
SetFileTime
CreateDirectoryA
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
DuplicateHandle
GetFileType
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetPrivateProfileStringA
UnmapViewOfFile
SetFilePointer
SetEndOfFile
CreateFileA
CreateFileMappingA
MapViewOfFile
SetEvent
GetCurrentProcess
WideCharToMultiByte
TerminateProcess
CreateProcessA
GetLastError
CreateEventA
PostQueuedCompletionStatus
InterlockedExchangeAdd
GetQueuedCompletionStatus
HeapAlloc
TerminateThread
GetProcessHeap
HeapFree
CreateIoCompletionPort
CreateToolhelp32Snapshot
Process32First
Process32Next
GetModuleHandleA
GlobalAlloc
GlobalFree
GetDriveTypeA
GetSystemInfo
GetVersionExA
lstrcpyA
GetCurrentProcessId
GetLocalTime
GetModuleFileNameA
GetCurrentDirectoryA
GetTickCount
DeleteFileA
OpenProcess
WaitForSingleObject
CreateThread
CloseHandle
GetTimeZoneInformation
Sleep
user32
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
LoadIconA
PostMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetClientRect
CopyRect
SetWindowTextA
GetTopWindow
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
LoadStringA
GetSystemMetrics
CharUpperA
GetCapture
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
FreeSid
InitializeSecurityDescriptor
GetLengthSid
SetSecurityDescriptorDacl
AllocateAndInitializeSid
InitializeAcl
AddAccessAllowedAce
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHFileOperationA
ord51
comctl32
ord17
ws2_32
gethostbyaddr
recv
send
accept
ioctlsocket
connect
select
socket
WSAEventSelect
WSAIoctl
htons
bind
listen
closesocket
recvfrom
getpeername
ntohs
WSARecv
WSASocketA
setsockopt
WSAGetLastError
inet_addr
gethostbyname
WSAAddressToStringA
gethostname
WSACleanup
WSAStartup
htonl
inet_ntoa
ntohl
__WSAFDIsSet
sendto
WSASend
wininet
InternetGetLastResponseInfoA
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetSetOptionExA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
iphlpapi
GetIpAddrTable
GetBestInterface
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
LPPlatfo Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE