Static task
static1
Behavioral task
behavioral1
Sample
54273146d5f3b7f7e0a7c04ec5605ac7ed394c38d50f70c6b78a0295fed24713.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
54273146d5f3b7f7e0a7c04ec5605ac7ed394c38d50f70c6b78a0295fed24713.exe
Resource
win10v2004-20220812-en
General
-
Target
54273146d5f3b7f7e0a7c04ec5605ac7ed394c38d50f70c6b78a0295fed24713
-
Size
160KB
-
MD5
a07db0beaca92d28d4ce10f184b07370
-
SHA1
53295e2351d29709fa8686ba7deae409158635b1
-
SHA256
54273146d5f3b7f7e0a7c04ec5605ac7ed394c38d50f70c6b78a0295fed24713
-
SHA512
36dad892c093f6e7543ba65da4a548235d995fac70fc159df7beb09392ccf31741224cc4a3d767603b44c495a04f35270a9714c8d3398c230fb3d00a3c07f65d
-
SSDEEP
3072:xSZaMseF6ck/X3Wlx/Jyfq1BNg9a8g17qjqlox:xOaM0X3IxRyC1g9a8jtx
Malware Config
Signatures
Files
-
54273146d5f3b7f7e0a7c04ec5605ac7ed394c38d50f70c6b78a0295fed24713.exe windows x86
29c08ba3f73c77a06d1d048e876200f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
SetFileAttributesA
ReleaseMutex
ReadFile
CreateFileA
GetLastError
CreateMutexA
CopyFileA
GetTempFileNameA
MoveFileA
WriteFile
SizeofResource
FindResourceA
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetComputerNameA
SetEvent
TerminateThread
GetSystemTime
FindClose
FindFirstFileA
GetFileSize
HeapAlloc
GetProcessHeap
HeapFree
lstrcatA
MapViewOfFile
CreateFileMappingA
GetFileInformationByHandle
ResetEvent
SetFileTime
FlushFileBuffers
GlobalFree
GlobalUnlock
GlobalLock
SetThreadPriority
CreateThread
GlobalAlloc
SystemTimeToFileTime
LocalAlloc
RemoveDirectoryA
GetTickCount
InitializeCriticalSection
DeleteCriticalSection
FileTimeToSystemTime
GetProcAddress
LoadLibraryA
GetVersionExA
FreeLibrary
ResumeThread
SetStdHandle
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetStringTypeW
GetStringTypeA
Sleep
GetFileAttributesA
MultiByteToWideChar
lstrcpynA
CreateProcessA
WaitForSingleObject
CloseHandle
DeleteFileA
lstrcmpiA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
CreateDirectoryA
GetLocalTime
lstrlenA
LocalFree
InterlockedDecrement
lstrcpyA
WideCharToMultiByte
MoveFileExA
HeapSize
GetCurrentProcess
TerminateProcess
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
RaiseException
HeapReAlloc
RtlUnwind
user32
wsprintfA
RegisterWindowMessageA
TranslateMessage
SendMessageA
FindWindowA
PostQuitMessage
DestroyWindow
DefWindowProcA
GetMessageA
PostMessageA
KillTimer
SetTimer
CreateWindowExA
LoadStringA
IsWindow
PostThreadMessageA
DispatchMessageA
RegisterClassExA
PeekMessageA
advapi32
RegCreateKeyExA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegDeleteValueA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ole32
CoInitialize
CoCreateInstance
oleaut32
SysStringByteLen
GetErrorInfo
SysAllocString
SysFreeString
VariantInit
VariantClear
wininet
InternetConnectA
InternetSetOptionA
InternetSetStatusCallback
InternetWriteFile
InternetOpenA
FtpGetCurrentDirectoryA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpEndRequestA
InternetCanonicalizeUrlA
InternetCrackUrlA
FtpRemoveDirectoryA
FtpCreateDirectoryA
InternetGetLastResponseInfoA
FtpFindFirstFileA
FtpDeleteFileA
FtpRenameFileA
FtpOpenFileA
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
HttpSendRequestExA
InternetCloseHandle
InternetSetCookieA
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ