Static task
static1
Behavioral task
behavioral1
Sample
8475d451f4fc4fbcc7dca92b5457f161571a3bb2e2b7a56baf1f287c65650977.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8475d451f4fc4fbcc7dca92b5457f161571a3bb2e2b7a56baf1f287c65650977.exe
Resource
win10v2004-20221111-en
General
-
Target
8475d451f4fc4fbcc7dca92b5457f161571a3bb2e2b7a56baf1f287c65650977
-
Size
223KB
-
MD5
173c492891c977af8d5417fd3932d116
-
SHA1
8083291c0b2847448d858d9b17598c4b5989d2a6
-
SHA256
8475d451f4fc4fbcc7dca92b5457f161571a3bb2e2b7a56baf1f287c65650977
-
SHA512
1cf8140df1f80466a3a0f970732e07c36158094bda00d606da1dbb52290ee1c2b3f3e25afad73faade7febd9d36ca754597a0368c3df32ec47fc591e858afb4a
-
SSDEEP
3072:8Itu52uqpiMSbggZVyQZVbnYTdHJ0KRuX28PpWE+Fj2a119B6RRRRRRRRRRRRRRG:8Mt63bnvZVbYTdHSFpj8X11vWm
Malware Config
Signatures
Files
-
8475d451f4fc4fbcc7dca92b5457f161571a3bb2e2b7a56baf1f287c65650977.exe windows x86
60eda45ed9195e2968758b61b6601296
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
ReadFile
WriteFile
DeleteFileW
GetLastError
GetModuleFileNameW
GetTempPathW
GetTempFileNameW
FindResourceW
SizeofResource
LoadResource
LockResource
GetVersionExW
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
CloseHandle
CreateProcessW
GetCurrentProcessId
WideCharToMultiByte
FlushFileBuffers
FindResourceExW
GetModuleHandleW
GetProcAddress
Sleep
ReleaseMutex
GetNativeSystemInfo
InterlockedDecrement
GetPriorityClass
Module32FirstW
HeapDestroy
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
IsProcessorFeaturePresent
GetFileSize
CreateFileW
GetFileAttributesW
GetSystemTime
HeapFree
MultiByteToWideChar
GetProcessHeap
HeapAlloc
GetCommandLineW
lstrlenW
LocalFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
HeapCreate
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
ExitProcess
SetUnhandledExceptionFilter
LCMapStringW
GetCPInfo
RtlUnwind
GetCurrentThreadId
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
InterlockedExchange
GetStringTypeW
InterlockedIncrement
user32
ShowWindow
GetDlgItem
PeekMessageW
SendMessageW
CreateDialogParamW
PostQuitMessage
GetMessageW
TranslateMessage
DispatchMessageW
wvsprintfW
advapi32
GetCurrentHwProfileW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
ole32
CoInitialize
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
oleaut32
SysStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
SysAllocStringByteLen
VariantClear
SysAllocString
VariantInit
VarBstrCat
VariantChangeType
shlwapi
StrCmpW
StrToIntExW
PathFileExistsW
winhttp
WinHttpConnect
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpSetOption
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpenRequest
rpcrt4
UuidToStringW
UuidEqual
UuidCreate
UuidCreateSequential
RpcStringFreeW
Sections
.4CAA559 Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ