Static task
static1
Behavioral task
behavioral1
Sample
333c88d55b7f59791cdf32fd9f5e7b8d5b256dd578a85bfba8fffe417c2d7ddc.exe
Resource
win7-20220901-en
General
-
Target
333c88d55b7f59791cdf32fd9f5e7b8d5b256dd578a85bfba8fffe417c2d7ddc
-
Size
689KB
-
MD5
18ca542ec0e9ff0e5a35be2752660e00
-
SHA1
c40312ca8f0784c8803d940252653d2b10ca214a
-
SHA256
333c88d55b7f59791cdf32fd9f5e7b8d5b256dd578a85bfba8fffe417c2d7ddc
-
SHA512
8d7e2207fc035d91f964a0d69bffc5f6c8e831264bf111be5ee12f48d106c4efb8d1a26dc93d5fd4f8218851611bcc17f78fb46329c13c573f3b6310283fea3e
-
SSDEEP
12288:GvZpWOEpaikhCxuJF6rkfUvyU633qthQgfi8PQmuHZze040aYCI:eZbEEbhCxuJF1fw+aXQWFQmK40UK
Malware Config
Signatures
Files
-
333c88d55b7f59791cdf32fd9f5e7b8d5b256dd578a85bfba8fffe417c2d7ddc.exe windows x86
4d58ac02831979236bc94dcb0ed69ab8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenA
HttpQueryInfoA
HttpEndRequestW
HttpSendRequestExA
HttpSendRequestA
HttpAddRequestHeadersW
HttpOpenRequestA
InternetGetLastResponseInfoA
InternetWriteFile
InternetConnectA
InternetCrackUrlA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
HttpAddRequestHeadersA
kernel32
OutputDebugStringW
RemoveDirectoryW
FindFirstFileW
FindNextFileW
MoveFileExW
CreateThread
GetLastError
TerminateThread
GetExitCodeThread
QueryPerformanceCounter
FreeLibrary
FlushInstructionCache
GetCurrentProcess
RaiseException
GetCurrentThreadId
SetLastError
InitializeCriticalSectionAndSpinCount
LoadResource
SizeofResource
lstrcmpiW
CreateMutexW
LoadLibraryExW
GetModuleHandleW
FindResourceW
SetCurrentDirectoryW
MultiByteToWideChar
DecodePointer
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
DeleteCriticalSection
LoadLibraryW
CreateProcessW
FlushFileBuffers
ReadConsoleW
WriteConsoleW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
FindClose
GetDateFormatW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetConsoleCtrlHandler
FatalAppExitA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
GetTimeZoneInformation
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
lstrlenW
lstrcpynW
GetProcAddress
CreateEventW
CloseHandle
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
CreateSemaphoreW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
WaitForSingleObject
SetEvent
InterlockedExchange
RtlUnwind
IsDebuggerPresent
VirtualFree
VirtualAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentThread
GetStdHandle
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetCommandLineW
MoveFileW
CopyFileW
DeleteFileW
CreateDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
Sleep
SetEnvironmentVariableA
SetErrorMode
GetCurrentProcessId
ExitThread
WideCharToMultiByte
GetVersionExW
CreateFileW
GetFileTime
SetFileTime
GetShortPathNameW
GetFileSize
ReadFile
GetFileAttributesW
WriteFile
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
InterlockedCompareExchange
OpenProcess
lstrlenA
LoadLibraryA
LocalAlloc
LocalFree
GetSystemDirectoryW
DeviceIoControl
CreateFileA
lstrcpyA
GetSystemDirectoryA
lstrcatA
CopyFileA
GlobalAlloc
GlobalFree
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
IsProcessorFeaturePresent
EncodePointer
user32
GetLastInputInfo
wsprintfA
GetMessageW
IsCharAlphaNumericW
GetWindowLongW
SetTimer
CallWindowProcW
PostQuitMessage
DefWindowProcW
LoadCursorW
SetWindowLongW
CharNextW
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
DispatchMessageW
TranslateMessage
wsprintfW
PostMessageW
PostThreadMessageW
PeekMessageW
advapi32
AllocateAndInitializeSid
CryptGetKeyParam
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptDecrypt
CryptReleaseContext
CryptDestroyKey
CryptEncrypt
CryptSetKeyParam
CryptImportKey
CryptAcquireContextW
RegCreateKeyW
RegEnumValueW
RegEnumKeyW
FreeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyW
RegCloseKey
CheckTokenMembership
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
CommandLineToArgvW
SHOpenFolderAndSelectItems
SHGetDesktopFolder
ord165
ord155
SHGetPathFromIDListW
SHGetFolderLocation
ShellExecuteW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CLSIDFromProgID
CoCreateInstance
CoInitialize
CoFreeLibrary
CoLoadLibrary
CoCreateGuid
oleaut32
SysAllocStringByteLen
SysFreeString
VarUI4FromStr
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
shlwapi
SHDeleteValueW
SHSetValueW
wnsprintfW
SHGetValueW
crypt32
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CertCloseStore
CryptMsgClose
CertFreeCertificateContext
CertGetNameStringW
ws2_32
WSAStartup
psapi
GetProcessImageFileNameW
Sections
.text Size: 461KB - Virtual size: 461KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE