Static task
static1
Behavioral task
behavioral1
Sample
39860602b4c4849d70d2cf7f1863b5d4a4d252c93100ead2f5eca495b98e2ccb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
39860602b4c4849d70d2cf7f1863b5d4a4d252c93100ead2f5eca495b98e2ccb.exe
Resource
win10v2004-20221111-en
General
-
Target
39860602b4c4849d70d2cf7f1863b5d4a4d252c93100ead2f5eca495b98e2ccb
-
Size
276KB
-
MD5
96e0484ee4103c3f7e1e8d74f3f9a7a4
-
SHA1
516c6f171762b8c4c4396aed58e8621049a75438
-
SHA256
39860602b4c4849d70d2cf7f1863b5d4a4d252c93100ead2f5eca495b98e2ccb
-
SHA512
4b549bd894debe65dc612f374ecded82afe9952a7c2707dbdf82525c67bac074a18474e00241fb103cc8ad5a986360424a83638b6e0557bf3f4d899ffb931c7a
-
SSDEEP
6144:4L1fuessTEY5qbsxwUnLobneir+iiHIGGCGpZ:4Lpsz4wUL4neir+oZ
Malware Config
Signatures
Files
-
39860602b4c4849d70d2cf7f1863b5d4a4d252c93100ead2f5eca495b98e2ccb.exe windows x86
268d43aae49dbaef97b3aac067bfe5fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
FindResourceW
LoadResource
HeapAlloc
HeapFree
Process32First
WaitForSingleObject
SetEvent
GetLogicalDrives
GetProcessHeap
VirtualQueryEx
GetSystemWow64DirectoryA
OpenProcess
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
Sleep
SizeofResource
ReadProcessMemory
CreateEventA
HeapDestroy
CreateProcessA
GetSystemDirectoryA
RaiseException
FindFirstFileA
GetLastError
GetProcAddress
HeapSize
FindResourceExW
FindClose
Process32Next
LockResource
DecodePointer
GetSystemInfo
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
CreateMutexA
CreateToolhelp32Snapshot
DeleteCriticalSection
GetVersionExA
CloseHandle
GetCurrentProcessId
CreateThread
SetEndOfFile
CreateFileW
WriteConsoleW
SetStdHandle
ReadConsoleW
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
HeapReAlloc
CopyFileA
GetComputerNameA
QueryPerformanceCounter
GetModuleFileNameW
GetConsoleMode
EncodePointer
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetStringTypeW
IsDebuggerPresent
OutputDebugStringW
GetCommandLineA
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCurrentThreadId
GetStdHandle
GetFileType
ExitProcess
GetModuleHandleExW
AreFileApisANSI
ReadFile
SetFilePointerEx
FlushFileBuffers
WriteFile
GetConsoleCP
user32
GetWindowTextA
SetWindowsHookExA
GetMessageA
GetKeyState
CallNextHookEx
GetForegroundWindow
GetAsyncKeyState
MessageBoxA
GetSystemMetrics
advapi32
GetCurrentHwProfileA
GetUserNameA
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ