Static task
static1
Behavioral task
behavioral1
Sample
1694bacd0708d9e53adca7e4ec2dd007b25ef7347489cc4939da6cebe3366859.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1694bacd0708d9e53adca7e4ec2dd007b25ef7347489cc4939da6cebe3366859.exe
Resource
win10v2004-20221111-en
General
-
Target
1694bacd0708d9e53adca7e4ec2dd007b25ef7347489cc4939da6cebe3366859
-
Size
128KB
-
MD5
10cd7af75b0bf8384cb4a1f20bfeca40
-
SHA1
cd832b8d8a4610337cf69ecd8242c2217baedb18
-
SHA256
1694bacd0708d9e53adca7e4ec2dd007b25ef7347489cc4939da6cebe3366859
-
SHA512
3e83e764ada7f2cbe141168ce1ba0e78b0fde557f01b1dafccc410144803d176fd8cc52cd53b177381b8c38891516a5bab9a3dbe52d47be6d0880c8004ed7536
-
SSDEEP
3072:+o/k3WHhXWzEPlJFSI47KCSDADeak7dJHB/Au:IihBTv4XSsQLH5Au
Malware Config
Signatures
Files
-
1694bacd0708d9e53adca7e4ec2dd007b25ef7347489cc4939da6cebe3366859.exe windows x86
f2406342f3b89f83b6b72f92ddc43bfc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
DeleteFileA
IsBadWritePtr
IsBadReadPtr
GetLastError
GetTempFileNameA
GetTempPathA
GetPrivateProfileSectionA
GetModuleFileNameA
ResumeThread
GetPrivateProfileStringA
WaitForSingleObject
CreateProcessA
CloseHandle
LCMapStringW
LCMapStringA
ReadFile
SetEndOfFile
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
CreateFileA
GetStringTypeW
CreateThread
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
RaiseException
TlsAlloc
SetLastError
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
WriteFile
InitializeCriticalSection
HeapReAlloc
HeapSize
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetUnhandledExceptionFilter
SetFilePointer
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
user32
wsprintfA
SetWindowLongA
MoveWindow
DialogBoxParamA
GetDesktopWindow
DestroyWindow
advapi32
RegSetValueExA
RegCreateKeyExA
shell32
ShellExecuteA
wininet
InternetCloseHandle
InternetCrackUrlA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetSetStatusCallback
InternetCanonicalizeUrlA
InternetOpenA
InternetReadFile
shlwapi
PathAppendA
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ