Static task
static1
Behavioral task
behavioral1
Sample
93067e4e1cb2aebdd9f651b5e35ebca39a24be36d7db3ab874b77ad7744cef3c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
93067e4e1cb2aebdd9f651b5e35ebca39a24be36d7db3ab874b77ad7744cef3c.exe
Resource
win10v2004-20220901-en
General
-
Target
93067e4e1cb2aebdd9f651b5e35ebca39a24be36d7db3ab874b77ad7744cef3c
-
Size
165KB
-
MD5
fd9751c6fa72a98f88043a17487bf2a6
-
SHA1
d0dbe024226c7805882c3da8bc939529a849e94e
-
SHA256
93067e4e1cb2aebdd9f651b5e35ebca39a24be36d7db3ab874b77ad7744cef3c
-
SHA512
06f3a21fbeb5f68898676c89b388de54bde8a9f80556d61f70d805ff9f3cb0e404ee6bbce43873f62f89911aa9e97a75f876324789e7b22b2a5d6d1a2c51dfdf
-
SSDEEP
3072:/D8eQjZWaU2XvSQIp3YZXxC5jZeZSVkoM88ZkU:7xQFWyotIISUGJbk
Malware Config
Signatures
Files
-
93067e4e1cb2aebdd9f651b5e35ebca39a24be36d7db3ab874b77ad7744cef3c.exe windows x86
a1b2e24da54f3f22ebcd30de675a9b0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
DeleteFileA
GetEnvironmentVariableW
lstrlenA
FreeLibrary
WideCharToMultiByte
LoadLibraryW
MultiByteToWideChar
lstrlenW
GetProcAddress
LocalAlloc
lstrcatW
GetVersionExA
LocalFree
lstrcpyW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetTickCount
VirtualQueryEx
ReadProcessMemory
SetThreadPriority
GetProcessId
GetCurrentProcess
IsWow64Process
GetFileSize
CallNamedPipeA
WaitNamedPipeA
ConnectNamedPipe
WriteFile
CloseHandle
ReadFile
DisconnectNamedPipe
CreateNamedPipeA
CreateFileW
GetStringTypeW
CreateToolhelp32Snapshot
GetModuleFileNameA
Process32Next
CopyFileA
GetLastError
CreateDirectoryA
OutputDebugStringW
FlushFileBuffers
WriteConsoleW
LCMapStringW
SetStdHandle
SetFilePointerEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetProcessHeap
GetFileType
GetCPInfo
SetEndOfFile
GetOEMCP
GetACP
IsValidCodePage
GetModuleFileNameW
TerminateProcess
CreateProcessA
GetFileAttributesA
Sleep
GetVolumeInformationA
OpenProcess
Process32First
CreateFileA
TerminateThread
GetComputerNameA
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapFree
HeapAlloc
HeapReAlloc
CreateThread
GetCurrentThreadId
ExitThread
LoadLibraryExW
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
RaiseException
RtlUnwind
HeapSize
GetConsoleMode
ReadConsoleW
SetLastError
GetConsoleCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
user32
wsprintfW
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
shell32
SHGetFolderPathA
wininet
InternetCloseHandle
InternetConnectA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
HttpQueryInfoA
urlmon
URLDownloadToFileA
shlwapi
PathCombineW
ws2_32
WSAGetLastError
socket
htons
recv
send
gethostbyname
closesocket
WSACleanup
WSAStartup
connect
crypt32
CryptBinaryToStringA
CertVerifyCertificateChainPolicy
CertFreeCertificateContext
CertCloseStore
CertGetCertificateChain
CertOpenSystemStoreA
CertFreeCertificateChain
CertFindChainInStore
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ