Static task
static1
Behavioral task
behavioral1
Sample
62d6c1a6900782782fd3073f860bab78c29cf50c3cd57c2bc8a268fbaebd24be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
62d6c1a6900782782fd3073f860bab78c29cf50c3cd57c2bc8a268fbaebd24be.exe
Resource
win10v2004-20220812-en
General
-
Target
62d6c1a6900782782fd3073f860bab78c29cf50c3cd57c2bc8a268fbaebd24be
-
Size
141KB
-
MD5
6260d1fd6a602cc71deca5a43a1d2f78
-
SHA1
db2aff3b5122bdf71bef79c9a737573d2aeda1c2
-
SHA256
62d6c1a6900782782fd3073f860bab78c29cf50c3cd57c2bc8a268fbaebd24be
-
SHA512
8c65c07b84068832488c78bb8379fdbe0d36a380f65151d9099f18e6a56949925f35bd5f6749153b2d996f51172748bcfddeabe6a3d4ab2fa351120583c9426a
-
SSDEEP
3072:HlvPe7uFI6o/oMoT4TRpeJEBwqnU5bLy:Ze7L/IT4TRpeJGPnCLy
Malware Config
Signatures
Files
-
62d6c1a6900782782fd3073f860bab78c29cf50c3cd57c2bc8a268fbaebd24be.exe windows x86
5891f386eefae179905424b2ffd2321f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
wtsapi32
WTSEnumerateSessionsA
kernel32
GetLastError
lstrcmpiA
GetProcAddress
Process32Next
CreateFileMappingA
GetSystemInfo
GetModuleHandleA
CreateToolhelp32Snapshot
Module32Next
CloseHandle
MapViewOfFile
UnmapViewOfFile
FreeLibrary
InterlockedIncrement
InterlockedDecrement
SetEvent
GetCommandLineA
InitializeCriticalSection
Module32First
TerminateThread
Sleep
MultiByteToWideChar
RaiseException
SetFileAttributesA
LoadLibraryA
GetExitCodeThread
GetModuleFileNameA
DeleteCriticalSection
GetCurrentThreadId
GetVersionExA
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
TerminateProcess
CreateProcessA
CreateEventA
OpenProcess
GetWindowsDirectoryA
WaitForSingleObject
Process32First
GetCurrentProcess
GetPrivateProfileStringA
GetPrivateProfileIntA
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetFileAttributesA
CreateDirectoryA
DeleteFileA
ExitThread
CreateThread
GetSystemTimeAsFileTime
GetStartupInfoA
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
GetFileType
SetFilePointer
SetHandleCount
GetStdHandle
HeapSize
ExitProcess
ReadFile
WriteFile
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
CreateFileA
InitializeCriticalSectionAndSpinCount
VirtualAlloc
HeapReAlloc
FlushFileBuffers
user32
KillTimer
WaitForInputIdle
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
PostThreadMessageA
advapi32
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyA
RegQueryValueExA
CryptHashData
CryptDestroyHash
CryptDecrypt
CheckTokenMembership
FreeSid
CryptCreateHash
CryptEncrypt
AllocateAndInitializeSid
CryptAcquireContextA
CryptReleaseContext
GetTokenInformation
CryptDeriveKey
OpenProcessToken
shell32
ShellExecuteExA
CommandLineToArgvW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ