Static task
static1
Behavioral task
behavioral1
Sample
d8a5da6cbb12814c6024a50b2df0077c78d05748424a97506f2e754df83e6b8f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8a5da6cbb12814c6024a50b2df0077c78d05748424a97506f2e754df83e6b8f.exe
Resource
win10v2004-20220901-en
General
-
Target
d8a5da6cbb12814c6024a50b2df0077c78d05748424a97506f2e754df83e6b8f
-
Size
37KB
-
MD5
106cc69125282bab2b64904a9213d6d0
-
SHA1
688fe72c0a613680a9d6fec200428affdb2cfa68
-
SHA256
d8a5da6cbb12814c6024a50b2df0077c78d05748424a97506f2e754df83e6b8f
-
SHA512
feb62525d05d400674c42a0c1cc0a992455bacaa628fceb5f36d47da7eb2bb77e6902f0163c8a4e77bb5619e3a7f6e9286ea75bc4b9d6636d6b3aa0d121c0035
-
SSDEEP
768:5nVSeOoFqeaN1DEEKcqiv1ORHO/AKPoZbp9kEuutmreRsA75ReHibRJL8:5npqeaN1DEEKcZv1ODCWmutmrbyRVdJL
Malware Config
Signatures
Files
-
d8a5da6cbb12814c6024a50b2df0077c78d05748424a97506f2e754df83e6b8f.exe windows x86
e7085febdf8078db699bc64b713bfdd6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
FindFirstFileA
GlobalFree
FindClose
CreateFileMappingA
GetModuleFileNameA
FindNextFileA
CloseHandle
ExpandEnvironmentStringsA
GetCurrentThreadId
DeleteFileA
WaitForSingleObject
GetProcAddress
GetCurrentProcess
IsDebuggerPresent
CheckRemoteDebuggerPresent
SetPriorityClass
GetFileAttributesA
CreateProcessA
ReadFile
GetEnvironmentVariableA
GetShortPathNameA
SetFileAttributesA
GetModuleHandleA
GlobalAlloc
ExitProcess
GetComputerNameA
GetSystemInfo
GetVersionExA
CreateProcessW
CreateRemoteThread
TerminateThread
lstrcatW
GetWindowsDirectoryW
SetFileTime
GetWindowsDirectoryA
CreateDirectoryA
GetFileTime
GetLocalTime
MoveFileExA
VirtualQuery
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
VirtualAlloc
SetUnhandledExceptionFilter
OpenMutexA
CreateMutexA
DeviceIoControl
GetStartupInfoA
WriteFile
GetDriveTypeA
UnmapViewOfFile
MapViewOfFile
lstrlenA
GetTickCount
SetFilePointer
GetFileSize
CreateFileA
GetFullPathNameA
Sleep
ResumeThread
user32
SetTimer
wsprintfA
CharLowerA
ToAsciiEx
GetSystemMetrics
GetWindowThreadProcessId
FindWindowA
MapVirtualKeyA
GetAsyncKeyState
GetKeyboardLayout
GetWindowTextA
GetForegroundWindow
GetKeyboardState
GetKeyState
GetKeyNameTextA
advapi32
RegOpenKeyExA
GetUserNameA
RegDeleteValueA
RegEnumValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
shell32
ord680
ShellExecuteA
ole32
CoUninitialize
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
VariantClear
msvcrt
_XcptFilter
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_strrev
_exit
isalpha
toupper
clock
fclose
fprintf
fopen
tolower
memcpy
memcmp
_endthreadex
memset
rand
srand
strstr
atoi
_beginthreadex
strtok
printf
??2@YAPAXI@Z
strchr
strncmp
??3@YAXPAX@Z
free
malloc
sprintf
ntdll
NtOpenProcess
NtClose
NtWriteVirtualMemory
NtProtectVirtualMemory
NtResumeThread
NtAllocateVirtualMemory
NtQueueApcThread
urlmon
URLDownloadToFileA
ws2_32
sendto
inet_ntoa
inet_addr
WSAStartup
gethostname
send
gethostbyname
closesocket
socket
recv
connect
htons
wininet
HttpOpenRequestA
InternetReadFile
InternetConnectA
InternetOpenA
InternetCloseHandle
HttpSendRequestA
iphlpapi
GetIpForwardTable
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ