Static task
static1
Behavioral task
behavioral1
Sample
74b951c88006ee576e48917229bf7ef0819413b5b2a66a2b640663338c6663f3.exe
Resource
win7-20221111-en
General
-
Target
74b951c88006ee576e48917229bf7ef0819413b5b2a66a2b640663338c6663f3
-
Size
208KB
-
MD5
2072bc41280a80d0065790a057ff3710
-
SHA1
22c847a90126798e6cfc8d3a06feb6f7175c44d9
-
SHA256
74b951c88006ee576e48917229bf7ef0819413b5b2a66a2b640663338c6663f3
-
SHA512
b53d24c0074688b1280f0f5107950bb2de7216316981f1b5157c6f2acec6e0dac123004e4cc2639cf4ae80500e24ddacfb27723b5589f65882aa374765233324
-
SSDEEP
6144:zGepq3T2UagIaOb4XehT7bPPPnvOTQtUiUbPXheXKPyR6vd:qs62UaF94XeBnvwjPReXzsV
Malware Config
Signatures
Files
-
74b951c88006ee576e48917229bf7ef0819413b5b2a66a2b640663338c6663f3.exe windows x86
8f20acec9a5ba3361f45d5722c2e462c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegNotifyChangeKeyValue
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegEnumKeyA
gdi32
GetStockObject
wininet
InternetCloseHandle
HttpQueryInfoA
InternetErrorDlg
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetReadFile
InternetTimeToSystemTime
InternetTimeFromSystemTime
kernel32
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
FlushFileBuffers
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcmpA
CloseHandle
GetLastError
CreateMutexA
CreateEventA
lstrcatA
WaitForMultipleObjects
GetModuleFileNameA
WaitForSingleObject
GetCommandLineA
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
ReadFile
CreateFileA
lstrcpyA
DeleteFileA
CreateProcessA
SetHandleInformation
CreatePipe
WriteFile
Sleep
GetProcAddress
LoadLibraryA
SetEvent
OpenEventA
CreateThread
ResetEvent
SystemTimeToTzSpecificLocalTime
CompareFileTime
SystemTimeToFileTime
GetSystemTime
GetCurrentProcess
GetSystemInfo
SetFilePointer
GetTempPathA
GetEnvironmentVariableA
LocalFree
GetTickCount
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetLastError
TlsAlloc
GetTimeZoneInformation
HeapSize
TerminateProcess
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
ExitProcess
GetStartupInfoA
HeapReAlloc
VirtualQuery
VirtualAlloc
VirtualProtect
HeapAlloc
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
user32
CharNextA
GetDesktopWindow
MessageBoxA
LoadStringA
PeekMessageA
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
RegisterClassA
CreateWindowExA
ShowWindow
SetWindowLongA
DestroyWindow
GetWindowLongA
DefWindowProcA
PostQuitMessage
CreatePopupMenu
AppendMenuA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
PostMessageA
GetSystemMetrics
LoadImageA
MsgWaitForMultipleObjects
IsWindowUnicode
GetMessageW
wsprintfA
ole32
CLSIDFromString
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
shell32
ShellExecuteA
Shell_NotifyIconA
oleaut32
VarUI4FromStr
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE