Static task
static1
Behavioral task
behavioral1
Sample
fd179c849f94399311a2f3d01d9311eacfdd3d52d143e5603baf1a89effb7889.exe
Resource
win7-20220812-en
General
-
Target
fd179c849f94399311a2f3d01d9311eacfdd3d52d143e5603baf1a89effb7889
-
Size
384KB
-
MD5
2f8d4a80f080de8a362431a893d4eb30
-
SHA1
81af02d0b33ddcffaf3a492cc941afefbb8d1ff0
-
SHA256
fd179c849f94399311a2f3d01d9311eacfdd3d52d143e5603baf1a89effb7889
-
SHA512
0c2a1eb78aa9b4c7642416880c66df72249e036b88f433eda65513220a10de986ffef77a8e8d3a9181cb5e1a2dda49988f979ad5696782d19df359b17f55136f
-
SSDEEP
6144:K3Dal7dSw7GZY8Hxb3nhAwFyKy/rIrZhtoUhBid0+sDHkeh6rCgMh+Ir5u:Kml5Sw7GZY8HB3nhAwIKy/rIZLo/YHNW
Malware Config
Signatures
Files
-
fd179c849f94399311a2f3d01d9311eacfdd3d52d143e5603baf1a89effb7889.exe windows x86
c8ff5622a5a303c0252c734e67909293
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
Sleep
LockResource
FindResourceExW
FreeLibrary
GetVolumeInformationW
GetWindowsDirectoryW
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetModuleFileNameW
lstrcmpiW
LeaveCriticalSection
EnterCriticalSection
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetCommandLineW
LocalFree
GetModuleHandleW
WideCharToMultiByte
GetProcAddress
FreeEnvironmentStringsW
GetModuleFileNameA
lstrlenA
FlushFileBuffers
CloseHandle
CreateFileW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
IsValidCodePage
QueryPerformanceCounter
GetOEMCP
GetACP
GetLocaleInfoW
GetStdHandle
WriteFile
ExitProcess
HeapCreate
IsProcessorFeaturePresent
LoadLibraryW
SetConsoleCtrlHandler
GetCurrentThread
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FatalAppExitA
GetSystemTimeAsFileTime
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
user32
wsprintfW
CharNextW
advapi32
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
CryptAcquireContextW
shell32
CommandLineToArgvW
ole32
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateFreeThreadedMarshaler
CoCreateInstance
CoTaskMemFree
CoInitializeEx
OleRun
CoUninitialize
oleaut32
CreateErrorInfo
SysAllocStringLen
SysAllocString
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringLen
SysFreeString
SysAllocStringByteLen
GetErrorInfo
VariantClear
VariantChangeType
VariantInit
SetErrorInfo
SysStringByteLen
wininet
HttpOpenRequestW
InternetConnectW
InternetOpenW
HttpSendRequestW
InternetCloseHandle
InternetReadFile
winhttp
WinHttpCrackUrl
Sections
.text Size: 271KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE