Static task
static1
Behavioral task
behavioral1
Sample
46f4f55aa37657802b6532ab917aa1549e96a5b245b623e4bec9de4a73566b89.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
46f4f55aa37657802b6532ab917aa1549e96a5b245b623e4bec9de4a73566b89.exe
Resource
win10v2004-20220812-en
General
-
Target
46f4f55aa37657802b6532ab917aa1549e96a5b245b623e4bec9de4a73566b89
-
Size
148KB
-
MD5
bc06122edca65d6dbba7359862263328
-
SHA1
94f61edb78cc1e83b9fcdedbd70c5b0e20c0a516
-
SHA256
46f4f55aa37657802b6532ab917aa1549e96a5b245b623e4bec9de4a73566b89
-
SHA512
1dc0c3344652df0631e0fac9fe053f3b8f66ea4564eaad9f253f0c8f76099d5d4538f98fda03f8a017143f9d8dfd3dd6c3f3b9c81c0cb2785f6e8f2dd9d00b09
-
SSDEEP
3072:a9GsoYYhBHN6vdirgMyZRDvIYBYkMB7eqJMzP/lx9lL:UGso7h7PwRQYBrMBsd
Malware Config
Signatures
Files
-
46f4f55aa37657802b6532ab917aa1549e96a5b245b623e4bec9de4a73566b89.exe windows x86
dad9d88db347ce798925e9608222ffb7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupIterateCabinetA
shlwapi
SHDeleteKeyA
StrStrIW
StrRChrA
StrStrA
StrStrW
StrRChrW
StrStrIA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
InternetGetConnectedState
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetOpenA
InternetOpenUrlA
HttpSendRequestA
kernel32
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
GetEnvironmentVariableA
GetModuleFileNameA
LCMapStringW
LCMapStringA
FreeLibrary
GetProcAddress
LoadLibraryA
GetShortPathNameA
CopyFileA
DeleteFileA
HeapDestroy
GetCommandLineA
CloseHandle
Sleep
GetLastError
CreateMutexA
WaitForSingleObject
HeapFree
CreateProcessA
GetProcessHeap
SetUnhandledExceptionFilter
HeapCreate
GetVersionExA
HeapAlloc
GetStringTypeA
GetWindowsDirectoryA
GetTempPathA
OpenProcess
TerminateProcess
WideCharToMultiByte
MoveFileA
MoveFileExA
FindNextFileA
GetFileAttributesA
FindClose
FindFirstFileA
RemoveDirectoryA
CreateDirectoryA
ReadFile
GetFileSize
WriteFile
CreateFileA
GetTempFileNameA
SetEnvironmentVariableA
lstrcatA
lstrlenA
lstrcpynA
SetWaitableTimer
CreateWaitableTimerA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
ExitProcess
GetVersion
GetStartupInfoA
GetModuleHandleA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
RtlUnwind
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
GetSystemDirectoryA
lstrcpyA
user32
DispatchMessageA
TranslateMessage
KillTimer
GetMessageA
SetTimer
FindWindowA
SendMessageA
wsprintfA
CharLowerA
CharLowerW
PostQuitMessage
advapi32
RegDeleteValueA
RegQueryValueExA
RegEnumValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE