Static task
static1
Behavioral task
behavioral1
Sample
0364ff6bbc1a547139359bfa6c7af8fab3d3d6d932d9790695009fa32e4d98b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0364ff6bbc1a547139359bfa6c7af8fab3d3d6d932d9790695009fa32e4d98b2.exe
Resource
win10v2004-20220812-en
General
-
Target
0364ff6bbc1a547139359bfa6c7af8fab3d3d6d932d9790695009fa32e4d98b2
-
Size
815KB
-
MD5
0a96fe9196e586a0565e0cd3f0766840
-
SHA1
97d890839fa9cddd5805e86215d12e466de9cf48
-
SHA256
0364ff6bbc1a547139359bfa6c7af8fab3d3d6d932d9790695009fa32e4d98b2
-
SHA512
ae5e3f6fa4fec8ffaaddf3a635ae1c7d668f6fb6d6ff882b05262b3d058ddbb3edce639eb9912821372c54eb252f3171e529bbbf8ff53ea7403e2aaf8458497e
-
SSDEEP
24576:MyUvOvf0jVujDaUBTS07rXNCgV4iu28/WRHUNK:nf0ItSapZ4iuR/WRHUA
Malware Config
Signatures
Files
-
0364ff6bbc1a547139359bfa6c7af8fab3d3d6d932d9790695009fa32e4d98b2.exe windows x86
216de4529b2433a99be0b0540f1e7647
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlCompareMemory
strstr
RtlZeroMemory
RtlMoveMemory
mbstowcs
memcpy
memset
_chkstk
kernel32
HeapReAlloc
GetCurrentProcess
GetProcAddress
GetModuleHandleA
IsDebuggerPresent
VirtualFree
VirtualAlloc
VirtualProtect
ExitProcess
FindResourceA
lstrcmpA
FreeResource
FreeLibrary
LoadResource
Process32First
WaitForSingleObjectEx
GetWindowsDirectoryA
Sleep
SizeofResource
TerminateProcess
GetLastError
CopyFileA
LoadLibraryA
Process32Next
LockResource
GetModuleFileNameA
CreateMutexA
CreateToolhelp32Snapshot
CloseHandle
GetCurrentProcessId
GetTempPathA
CreateThread
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
OpenFileMappingA
HeapAlloc
HeapFree
GetProcessHeap
TlsGetValue
OutputDebugStringW
InitializeCriticalSection
TlsSetValue
LeaveCriticalSection
EnterCriticalSection
TlsAlloc
GetThreadContext
SetThreadContext
ReadProcessMemory
CreateProcessA
VirtualAllocEx
WriteProcessMemory
ResumeThread
IsBadReadPtr
CreateRemoteThread
OpenProcess
VirtualFreeEx
user32
CharLowerA
advapi32
RegCloseKey
RegOpenKeyA
CryptGenRandom
CryptAcquireContextA
RegSetValueExA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
shlwapi
PathFileExistsA
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 794KB - Virtual size: 794KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ