Static task
static1
Behavioral task
behavioral1
Sample
b20bd49202d7011b59ffcb83ab25e30d25838f0017f0257ac3e32fbe0a28e6bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b20bd49202d7011b59ffcb83ab25e30d25838f0017f0257ac3e32fbe0a28e6bd.exe
Resource
win10v2004-20220812-en
General
-
Target
b20bd49202d7011b59ffcb83ab25e30d25838f0017f0257ac3e32fbe0a28e6bd
-
Size
138KB
-
MD5
f59b6e4aa4ab4fb392918f3975885d0e
-
SHA1
cfee4c64c4728254aa1e2ffff2263bd9c25e4f66
-
SHA256
b20bd49202d7011b59ffcb83ab25e30d25838f0017f0257ac3e32fbe0a28e6bd
-
SHA512
17aa6a3f53d6d111512b0dd6d8b4ef1b9205e99029e87229d97dbac46cb04e6247cea61e61c4fc61dd626021cd34227db18d51fa539164c8c9a0ef97aedeaff9
-
SSDEEP
3072:Mydp70Kw0Kgp+33pDmaO+0PDGSXU3HvGG:TdN0sgmnPUXvGG
Malware Config
Signatures
Files
-
b20bd49202d7011b59ffcb83ab25e30d25838f0017f0257ac3e32fbe0a28e6bd.exe windows x86
cb246f9551929a38f1cab92b8c81340a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
Sleep
GetFileAttributesA
CreateProcessA
TerminateProcess
CreateDirectoryA
GetLastError
CopyFileA
Process32Next
GetModuleFileNameA
CreateToolhelp32Snapshot
CloseHandle
GetCurrentProcessId
DeleteFileA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
OpenProcess
GetTickCount
VirtualQueryEx
ReadProcessMemory
SetThreadPriority
GetProcessId
CreateThread
GetCurrentProcess
IsWow64Process
GetFileSize
CallNamedPipeA
WaitNamedPipeA
ConnectNamedPipe
WriteFile
TerminateThread
ReadFile
DisconnectNamedPipe
CreateNamedPipeA
Process32First
CreateFileA
DeleteCriticalSection
GetComputerNameA
CreateFileW
GetStringTypeW
FlushFileBuffers
WriteConsoleW
LCMapStringW
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
RaiseException
RtlUnwind
HeapSize
InitializeCriticalSectionAndSpinCount
GetConsoleMode
ReadConsoleW
SetLastError
InterlockedIncrement
GetCurrentThreadId
GetStdHandle
GetModuleFileNameW
WideCharToMultiByte
GetConsoleCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
GetFileType
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
OutputDebugStringW
LoadLibraryW
SetEndOfFile
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetFolderPathA
wininet
InternetOpenA
HttpOpenRequestA
InternetReadFile
InternetConnectA
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
urlmon
URLDownloadToFileA
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Xyl2k! Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE