Static task
static1
Behavioral task
behavioral1
Sample
4be15693d1e305cbc64a3f7b0787304bf57da8d82dfef9eb162d70b9eab21189.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4be15693d1e305cbc64a3f7b0787304bf57da8d82dfef9eb162d70b9eab21189.exe
Resource
win10v2004-20221111-en
General
-
Target
4be15693d1e305cbc64a3f7b0787304bf57da8d82dfef9eb162d70b9eab21189
-
Size
992KB
-
MD5
30b974fd9ea1a37baa735d6d87ff05b0
-
SHA1
c4840858501e85a66ba6823fa2d69442a3e02ef8
-
SHA256
4be15693d1e305cbc64a3f7b0787304bf57da8d82dfef9eb162d70b9eab21189
-
SHA512
9cb75eef06d29c7ee428c0545768eea08a2b2651427ad0fba8e438e9d2be702ac6a9de7d4e42867d7dad3a3a25d8d727c254c5efe05ad83999e02ac19776e7ed
-
SSDEEP
24576:/82WGvEzgyjvS+nyAQyK8pE4S0XmFHES:/8tGvnGS+yAQyKGf
Malware Config
Signatures
Files
-
4be15693d1e305cbc64a3f7b0787304bf57da8d82dfef9eb162d70b9eab21189.exe windows x86
cc156ae7edc8c0dd6519e0a5b30c8425
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
GetDriveTypeW
GetFullPathNameA
CreateProcessA
CreatePipe
PeekNamedPipe
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GenerateConsoleCtrlEvent
Module32First
LoadLibraryW
GetProcAddress
GetModuleFileNameA
GetLocalTime
GetVersionExA
OpenProcess
Process32First
Process32Next
LoadLibraryA
CopyFileA
CreateDirectoryA
GetFileAttributesA
GetFileSize
ReadFile
DeleteFileA
CreateFileA
UnlockFileEx
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
lstrlenA
lstrlenW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FlushInstructionCache
lstrcmpA
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
RaiseException
GetCurrentThreadId
SetLastError
GetLongPathNameW
GetCommandLineW
OutputDebugStringW
HeapAlloc
GetProcessHeap
VirtualQuery
WriteProcessMemory
SetUnhandledExceptionFilter
GetModuleHandleW
HeapFree
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetCurrentProcessId
SuspendThread
OpenThread
TerminateProcess
WaitForMultipleObjects
CreateProcessW
SearchPathW
CreateEventA
ReadProcessMemory
VirtualAllocEx
InitializeCriticalSection
SetErrorMode
GetModuleHandleA
InterlockedCompareExchange
InterlockedPushEntrySList
OutputDebugStringA
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
HeapDestroy
HeapReAlloc
HeapSize
InterlockedExchange
Sleep
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineA
HeapSetInformation
VirtualProtect
LCMapStringW
GetCPInfo
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
UnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetLocaleInfoW
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
FatalAppExitA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetConsoleCtrlHandler
FreeLibrary
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
CreateFileW
FlushFileBuffers
SetEndOfFile
SetFilePointerEx
FindClose
RemoveDirectoryW
DeleteFileW
DeviceIoControl
GetFullPathNameW
GetFileAttributesW
CreateDirectoryExW
CopyFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileInformationByHandle
GetFileAttributesExW
GetFileTime
SetFileTime
SetFileAttributesW
MoveFileExW
GetDiskFreeSpaceExW
FindFirstFileW
FindNextFileW
CreateDirectoryW
GetTempPathW
AreFileApisANSI
UnlockFile
LockFileEx
LockFile
SleepEx
SetEnvironmentVariableA
GetTimeZoneInformation
CompareStringW
GetDateFormatA
GetTimeFormatA
GetFileSizeEx
GetSystemInfo
MapViewOfFileEx
OpenFileMappingA
CreateFileMappingA
UnmapViewOfFile
GetCurrentProcess
DuplicateHandle
CloseHandle
LocalFree
FormatMessageA
GetLastError
GetModuleFileNameW
InterlockedDecrement
IsProcessorFeaturePresent
InterlockedIncrement
WaitForSingleObject
user32
EndPaint
CallWindowProcA
DestroyWindow
FillRect
ReleaseCapture
GetClassNameA
GetDlgItem
IsChild
SetCapture
RedrawWindow
SendMessageA
BeginPaint
IsWindow
GetParent
DispatchMessageA
TranslateMessage
GetMessageA
UnregisterClassA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateAcceleratorTableA
CreateWindowExA
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
RegisterClassExA
LoadCursorA
GetClassInfoExA
GetDesktopWindow
GetFocus
GetWindow
SetFocus
SetWindowLongA
GetWindowLongA
DefWindowProcA
GetSysColor
CharNextA
DestroyAcceleratorTable
MoveWindow
SetWindowPos
GetClientRect
ClientToScreen
ole32
OleInitialize
OleLockRunning
CoTaskMemAlloc
CoGetClassObject
CLSIDFromProgID
CoInitialize
CoUninitialize
OleUninitialize
StringFromGUID2
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromString
oleaut32
SysAllocString
VariantClear
SysAllocStringLen
SysStringLen
VariantInit
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysFreeString
advapi32
SetSecurityDescriptorDacl
RegDeleteValueW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
InitializeSecurityDescriptor
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueA
shlwapi
PathFileExistsW
StrStrW
PathFindFileNameW
tx_log
?SetLogPath@TxLogWrapper@@YGXPB_W@Z
?MakeLogOutput@TxLogWrapper@@YGXPB_W0W4LogLevel@1@@Z
?GetLogLevel@TxLogWrapper@@YG?AW4LogLevel@1@XZ
?FlushLog@TxLogWrapper@@YGXXZ
?SetLogLevel@TxLogWrapper@@YGXW4LogLevel@1@@Z
gdi32
GetStockObject
GetObjectA
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteDC
DeleteObject
GetDeviceCaps
winmm
timeKillEvent
timeSetEvent
timeGetDevCaps
timeBeginPeriod
ws2_32
getsockopt
inet_ntoa
socket
WSACleanup
WSAStartup
ntohl
WSAGetLastError
recv
gethostbyname
inet_addr
select
send
closesocket
accept
listen
ioctlsocket
htonl
__WSAFDIsSet
ntohs
htons
connect
bind
setsockopt
Sections
.text Size: 560KB - Virtual size: 559KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 56KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 234KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE