Static task
static1
Behavioral task
behavioral1
Sample
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe
Resource
win10v2004-20221111-en
General
-
Target
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34
-
Size
138KB
-
MD5
5bcaa9ea86e49f7da3615a5663797b6f
-
SHA1
b29a79a89d5aec764da4de93b26aec2d37e52083
-
SHA256
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34
-
SHA512
5c73abf6e892636dc13e86a882484919cd6701fabded4629045f2e92392d48852a62e9e5c3d8abf720d394d23c86713b6e5ad5290163b59aa71563b5a941db40
-
SSDEEP
3072:Mydp70Kw0Kgp+33pDmaO+0PDGSXU3HvGG:TdN0sgmnPUXvGG
Malware Config
Signatures
Files
-
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe windows x86
cb246f9551929a38f1cab92b8c81340a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
Sleep
GetFileAttributesA
CreateProcessA
TerminateProcess
CreateDirectoryA
GetLastError
CopyFileA
Process32Next
GetModuleFileNameA
CreateToolhelp32Snapshot
CloseHandle
GetCurrentProcessId
DeleteFileA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
OpenProcess
GetTickCount
VirtualQueryEx
ReadProcessMemory
SetThreadPriority
GetProcessId
CreateThread
GetCurrentProcess
IsWow64Process
GetFileSize
CallNamedPipeA
WaitNamedPipeA
ConnectNamedPipe
WriteFile
TerminateThread
ReadFile
DisconnectNamedPipe
CreateNamedPipeA
Process32First
CreateFileA
DeleteCriticalSection
GetComputerNameA
CreateFileW
GetStringTypeW
FlushFileBuffers
WriteConsoleW
LCMapStringW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
RaiseException
RtlUnwind
HeapSize
InitializeCriticalSectionAndSpinCount
GetConsoleMode
ReadConsoleW
SetLastError
InterlockedIncrement
GetCurrentThreadId
GetStdHandle
GetModuleFileNameW
WideCharToMultiByte
GetConsoleCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
GetFileType
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
OutputDebugStringW
LoadLibraryW
SetEndOfFile
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetFolderPathA
wininet
InternetOpenA
HttpOpenRequestA
InternetReadFile
InternetConnectA
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
urlmon
URLDownloadToFileA
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Xyl2k! Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE