Static task
static1
Behavioral task
behavioral1
Sample
82c05a6c5c72816fd7c206a6d7daf1d4d7602fd56b55353a5c2699ddd214a8f9.exe
Resource
win7-20220901-en
General
-
Target
82c05a6c5c72816fd7c206a6d7daf1d4d7602fd56b55353a5c2699ddd214a8f9
-
Size
557KB
-
MD5
0630d8bbf8872b0279924c137cb34a20
-
SHA1
f0d327c6e8ec7db3b938e5174c712c4172edc1e0
-
SHA256
82c05a6c5c72816fd7c206a6d7daf1d4d7602fd56b55353a5c2699ddd214a8f9
-
SHA512
228b2fd4a5b62a925316c0f536cf194a121fae584be4c42dd35a4f88ebb9317fcda560ea198b53352f69715c17554267f45a8058b97df892d3e0fe1cac9dc21a
-
SSDEEP
12288:MKX0i8GNDE2KVrJhTZnqlSXGdwJ4vNItIX:MqH8Y/KVrrT4lSXLyItIX
Malware Config
Signatures
Files
-
82c05a6c5c72816fd7c206a6d7daf1d4d7602fd56b55353a5c2699ddd214a8f9.exe windows x86
56c0bdc679f140241f048439488ae1a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
DeleteFileW
OpenProcess
GetFullPathNameW
FindFirstFileW
LoadLibraryW
MultiByteToWideChar
GetCurrentDirectoryW
GetProcAddress
FindClose
SetCurrentDirectoryW
FindNextFileW
GetFullPathNameA
CreateFileA
GetFileSize
SetFilePointer
TlsGetValue
SetEndOfFile
FreeLibrary
UnlockFile
LockFile
GetSystemTimeAsFileTime
WriteFile
TlsSetValue
GetVersionExW
GetFileAttributesA
ReadFile
GetFileAttributesW
FlushFileBuffers
GetTempPathW
GetLastError
LockFileEx
LoadLibraryA
TlsAlloc
CloseHandle
GetTempPathA
GetSystemTime
AreFileApisANSI
DeleteFileA
FindResourceW
LoadResource
GetModuleHandleW
LockResource
CopyFileW
GetModuleFileNameW
SystemTimeToFileTime
SetFileTime
LocalFileTimeToFileTime
CompareStringW
GetProcessHeap
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
Sleep
WideCharToMultiByte
CreateFileW
CreateDirectoryW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
SetEnvironmentVariableA
GetACP
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
GetCPInfo
HeapAlloc
WriteConsoleW
GetFileType
GetStdHandle
HeapReAlloc
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
HeapCreate
GetConsoleCP
GetConsoleMode
GetFileInformationByHandle
PeekNamedPipe
HeapSize
GetLocaleInfoW
TlsFree
SetLastError
GetCurrentThreadId
psapi
GetModuleFileNameExA
user32
SendMessageW
EnumWindows
wsprintfW
GetWindowThreadProcessId
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetFolderPathW
ShellExecuteW
ws2_32
htonl
send
gethostbyname
closesocket
socket
htons
connect
recv
WSAStartup
Sections
.text Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ