Static task
static1
Behavioral task
behavioral1
Sample
0b847e27b1f07f6290b9c3c793730fa66ee2749b124690e320eeb981c3c4e039.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0b847e27b1f07f6290b9c3c793730fa66ee2749b124690e320eeb981c3c4e039.exe
Resource
win10v2004-20221111-en
General
-
Target
0b847e27b1f07f6290b9c3c793730fa66ee2749b124690e320eeb981c3c4e039
-
Size
231KB
-
MD5
35a6d1e33aff0e1f083e7b2c15fafddb
-
SHA1
32e8eeef766e0ac7e0202158dc52b51597c36cc5
-
SHA256
0b847e27b1f07f6290b9c3c793730fa66ee2749b124690e320eeb981c3c4e039
-
SHA512
fb50f63dc6ef10b332cfcb918c2c88c08c680668c65984683f75d8ae4038e880c68fc1a88fd00564a5c7b50ec5f14e06e7b5668f62232645a1af51a250357e0d
-
SSDEEP
6144:R/tKJ4mWx0L4iM0eTNWGpMUYxb9ic9fzaO/mPg2iFUazX2V:RwL4yBZxkyAgr2V
Malware Config
Signatures
Files
-
0b847e27b1f07f6290b9c3c793730fa66ee2749b124690e320eeb981c3c4e039.exe windows x86
d7c75ad5d405344eda1e9287e627f167
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32
SetLastError
ReadFile
WriteFile
SetFilePointer
CloseHandle
GetTempFileNameA
GetTempPathA
lstrlenA
SetFileAttributesA
lstrcmpiA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrlenW
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcmpA
FindFirstFileA
WritePrivateProfileStringA
CopyFileA
FlushFileBuffers
Sleep
WaitForSingleObject
ConvertDefaultLocale
GetVersionExA
GetSystemInfo
GetPrivateProfileStringA
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryExA
SetEvent
CreateFileA
CreateThread
CreateEventA
GetModuleHandleA
GetCurrentProcessId
GetPrivateProfileSectionA
GlobalFree
ReleaseMutex
CreateMutexA
GetFileSize
CreateDirectoryA
GetProcessHeap
InterlockedIncrement
LoadLibraryA
InterlockedDecrement
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetLastError
GetTickCount
user32
RegisterClassExA
GetClassInfoExA
RegisterWindowMessageA
SetWindowTextA
SendDlgItemMessageA
ShowWindow
KillTimer
EndDialog
SetDlgItemTextA
GetDlgItemTextA
MoveWindow
GetSystemMetrics
SystemParametersInfoA
GetWindowRect
SetWindowLongA
SetFocus
CharNextA
EnableMenuItem
GetWindowLongA
PostMessageA
DialogBoxParamA
msvcrt
memcpy
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
__getmainargs
memset
_vsnprintf
_cexit
cmpbk32
PhoneBookParseInfoA
PhoneBookFreeFilter
PhoneBookLoad
PhoneBookMergeChanges
PhoneBookUnload
cmutil
CmStrchrA
IsLogonAsSystem
CmStrCpyAllocW
CmBuildFullPathFromRelativeA
?DeInit@CmLogFile@@QAEJXZ
?Init@CmLogFile@@QAEJPAUHINSTANCE__@@HPBD@Z
?SetParams@CmLogFile@@QAEJHKPBD@Z
?Start@CmLogFile@@QAEJH@Z
?Stop@CmLogFile@@QAEJXZ
CmLoadIconA
CmLoadSmallIconA
CmStrrchrA
?Log@CmLogFile@@QAAXW4_CMLOG_ITEM@@ZZ
CmFmtMsgA
??1CmLogFile@@QAE@XZ
??0CmLogFile@@QAE@XZ
CmCompareStringA
WzToSzWithAlloc
SzToWzWithAlloc
CmStrCpyAllocA
CmRealloc
CmMalloc
CmFree
comctl32
ord17
rasapi32
RasEnumConnectionsA
winhttp
WinHttpGetDefaultProxyConfiguration
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpReadData
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpCloseHandle
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 416KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE