Behavioral task
behavioral1
Sample
1e7a524194342259903321dbb8164b7448168a15f4b2c08d0498c1e4e584f6ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e7a524194342259903321dbb8164b7448168a15f4b2c08d0498c1e4e584f6ca.exe
Resource
win10v2004-20220901-en
General
-
Target
1e7a524194342259903321dbb8164b7448168a15f4b2c08d0498c1e4e584f6ca
-
Size
501KB
-
MD5
0330125c65c50cfe0e2c6faf03fa3b42
-
SHA1
261be3604adb5481c69fb7e1e6a7fcfa26438cb5
-
SHA256
1e7a524194342259903321dbb8164b7448168a15f4b2c08d0498c1e4e584f6ca
-
SHA512
40e7f46a09c244f1fd3ddf40a879a038d1b11432855aec00fe41db1508285ff1a4f81e77ce9dfaadfe8983415acb70bca7edd6a505e844f084527815919016f6
-
SSDEEP
6144:7ij9Al1cHvVR5FHXRxxdNn5FUNyp4D14Wq33OKgUcxAS71T8KIX8ErpKcF:7ijPj5FHXX3nFoUcSSh0frpKu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
1e7a524194342259903321dbb8164b7448168a15f4b2c08d0498c1e4e584f6ca.exe windows x86
4daf9bddc5b5eb939c759f4a2783cd0a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
libcurl
curl_easy_setopt
curl_easy_perform
curl_easy_strerror
curl_easy_cleanup
curl_easy_getinfo
curl_easy_init
curl_slist_free_all
curl_slist_append
winhttp
WinHttpGetProxyForUrl
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpCloseHandle
kernel32
GlobalFree
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetLastError
CreateMutexW
GetConsoleMode
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetThreadPriority
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SwitchToThread
GetCurrentProcessId
GetEnvironmentVariableW
FreeEnvironmentStringsW
GetCommandLineW
CloseHandle
DeleteFileW
ConnectNamedPipe
GetOverlappedResult
ReadFile
WriteFile
GetSystemTimeAsFileTime
FreeLibrary
GetProcAddress
GetTickCount
GetCurrentThreadId
GetCurrentThread
Sleep
DuplicateHandle
CreateFileW
GetTempPathW
GetFileSizeEx
SetFilePointerEx
SetEndOfFile
LockFileEx
UnlockFile
GetFullPathNameW
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateNamedPipeW
GetNamedPipeInfo
FlushFileBuffers
WaitForSingleObject
WaitForMultipleObjects
CreateEventW
SetEvent
ResetEvent
LoadLibraryExW
GetModuleFileNameW
SetEnvironmentVariableW
GetEnvironmentStringsW
GetStdHandle
SetStdHandle
SetThreadPriority
GetConsoleCP
TlsAlloc
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
GetCurrentProcess
FormatMessageW
LocalAlloc
LocalFree
LocalReAlloc
TerminateProcess
LCMapStringW
SetFilePointer
RtlCaptureStackBackTrace
GetCommandLineA
HeapFree
RtlUnwind
RaiseException
HeapAlloc
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitThread
CreateThread
GetModuleHandleW
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
SetHandleCount
GetFileType
GetStartupInfoA
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
IsDebuggerPresent
HeapSize
GetModuleHandleA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
user32
PeekMessageW
SetWindowLongW
CreateWindowExW
KillTimer
DefWindowProcW
RegisterClassW
PostQuitMessage
GetWindowLongW
PostMessageW
DestroyWindow
MsgWaitForMultipleObjectsEx
DispatchMessageW
TranslateMessage
SetTimer
advapi32
RegDeleteValueW
RegNotifyChangeKeyValue
GetUserNameW
RegEnumValueW
CredWriteW
CredDeleteW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
CredReadW
CredFree
shell32
ShellExecuteExW
SHCreateDirectoryExW
CommandLineToArgvW
ole32
OleRun
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
VariantInit
VariantClear
SysFreeString
Sections
.text Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE