Static task
static1
Behavioral task
behavioral1
Sample
4101d1b29b55f148bcd4f7ab13d3c8c1b385e0668a6e508cb2fe5b295daf9bc5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4101d1b29b55f148bcd4f7ab13d3c8c1b385e0668a6e508cb2fe5b295daf9bc5.exe
Resource
win10v2004-20220812-en
General
-
Target
4101d1b29b55f148bcd4f7ab13d3c8c1b385e0668a6e508cb2fe5b295daf9bc5
-
Size
135KB
-
MD5
200bd85daa5892ec1a1a46f6869f80aa
-
SHA1
bec5e46af1ea806fd1ddf2206ea3dfcb65ef7794
-
SHA256
4101d1b29b55f148bcd4f7ab13d3c8c1b385e0668a6e508cb2fe5b295daf9bc5
-
SHA512
5286503134adf67fdc07b94ec93e0da9829fb174fd6bc8653662f54ef3e1c507ff7dc4ace3949ae5cfe9408a7c2945da76e920c90ade2d4b5c7256d3cf104797
-
SSDEEP
3072:/nl1hBBk0iXN5PZ+TBAb5LUmSj9595yAn:PFBGPftHm
Malware Config
Signatures
Files
-
4101d1b29b55f148bcd4f7ab13d3c8c1b385e0668a6e508cb2fe5b295daf9bc5.exe windows x86
67feada1772af2f0a2117b9098de48d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GlobalAlloc
GlobalFree
GetFileSize
ReadFile
GetModuleFileNameW
CloseHandle
GetLocaleInfoW
lstrlenA
WriteFile
WideCharToMultiByte
lstrcpynW
CreateFileW
lstrlenW
lstrcatW
lstrcpyW
lstrcmpA
lstrcpynA
CreateProcessW
GetTickCount
MultiByteToWideChar
FlushFileBuffers
SetFilePointer
SystemTimeToFileTime
SetFileTime
GetFileAttributesW
GetCurrentDirectoryW
LocalFileTimeToFileTime
FindFirstFileW
FreeLibrary
MoveFileExW
SetEvent
GetModuleHandleW
LoadLibraryW
GetProcAddress
ResetEvent
CreateEventW
FindNextFileW
GetCurrentProcessId
InitializeCriticalSection
GetSystemDirectoryW
LeaveCriticalSection
EnterCriticalSection
ExitThread
GetComputerNameA
HeapAlloc
HeapFree
VirtualFree
VirtualAlloc
LoadLibraryA
GetModuleHandleA
WaitForSingleObject
SetWaitableTimer
CancelWaitableTimer
CreateWaitableTimerW
VirtualQuery
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
RaiseException
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
FindClose
Sleep
CreateMutexW
ExitProcess
DeleteFileW
GetTempPathW
CreateDirectoryW
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
SetUnhandledExceptionFilter
HeapCreate
GetSystemTime
GetTempFileNameW
GetLastError
HeapReAlloc
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
user32
SetWindowLongW
GetWindowLongW
ShowWindow
CreateWindowExW
LoadCursorW
EnumWindows
SetSysColors
LoadIconW
SystemParametersInfoW
RegisterClassW
EnableWindow
DefWindowProcW
GetWindowThreadProcessId
DestroyWindow
GetMessageW
TranslateMessage
SetWindowPos
IsWindow
GetSystemMetrics
SendMessageW
DispatchMessageW
wsprintfA
ExitWindowsEx
wsprintfW
GetClientRect
gdi32
GetStockObject
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
shell32
SHGetFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoInitializeEx
OleInitialize
CoGetClassObject
OleSetContainedObject
oleaut32
VariantClear
VariantInit
SysAllocString
ntdll
RtlUnwind
avicap32
capCreateCaptureWindowW
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ