Static task
static1
Behavioral task
behavioral1
Sample
d5391f404eb357634211cb5667d348254dddb6f6338631214b86ffe1b96d9a63.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5391f404eb357634211cb5667d348254dddb6f6338631214b86ffe1b96d9a63.exe
Resource
win10v2004-20220812-en
General
-
Target
d5391f404eb357634211cb5667d348254dddb6f6338631214b86ffe1b96d9a63
-
Size
222KB
-
MD5
e18fd90b4610816f5e78662bb149c55c
-
SHA1
dc02556ef4b655a3692bf465a5f8053fd07a673d
-
SHA256
d5391f404eb357634211cb5667d348254dddb6f6338631214b86ffe1b96d9a63
-
SHA512
18682651c87346bc536704fe5c8a799c7cbb1c498f13fb6e523b0ef7e921efac990a05ea74445443608d4d1519d07af19f9b4e1c42588f7eb31e3a3e7bc74fc8
-
SSDEEP
3072:GItu52uqpiMSbggZVyQZVbnYTdHJ0KRuX20pWE+Fj2a119B6RRRRRRRRRRRRRRRH:GMt63bnvZVbYTdHSNpj8X11vWp
Malware Config
Signatures
Files
-
d5391f404eb357634211cb5667d348254dddb6f6338631214b86ffe1b96d9a63.exe windows x86
60eda45ed9195e2968758b61b6601296
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
ReadFile
WriteFile
DeleteFileW
GetLastError
GetModuleFileNameW
GetTempPathW
GetTempFileNameW
FindResourceW
SizeofResource
LoadResource
LockResource
GetVersionExW
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
CloseHandle
CreateProcessW
GetCurrentProcessId
WideCharToMultiByte
FlushFileBuffers
FindResourceExW
GetModuleHandleW
GetProcAddress
Sleep
ReleaseMutex
GetNativeSystemInfo
InterlockedDecrement
GetPriorityClass
Module32FirstW
HeapDestroy
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
IsProcessorFeaturePresent
GetFileSize
CreateFileW
GetFileAttributesW
GetSystemTime
HeapFree
MultiByteToWideChar
GetProcessHeap
HeapAlloc
GetCommandLineW
lstrlenW
LocalFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
HeapCreate
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
ExitProcess
SetUnhandledExceptionFilter
LCMapStringW
GetCPInfo
RtlUnwind
GetCurrentThreadId
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
InterlockedExchange
GetStringTypeW
InterlockedIncrement
user32
ShowWindow
GetDlgItem
PeekMessageW
SendMessageW
CreateDialogParamW
PostQuitMessage
GetMessageW
TranslateMessage
DispatchMessageW
wvsprintfW
advapi32
GetCurrentHwProfileW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
ole32
CoInitialize
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
oleaut32
SysStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
SysAllocStringByteLen
VariantClear
SysAllocString
VariantInit
VarBstrCat
VariantChangeType
shlwapi
StrCmpW
StrToIntExW
PathFileExistsW
winhttp
WinHttpConnect
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpSetOption
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpenRequest
rpcrt4
UuidToStringW
UuidEqual
UuidCreate
UuidCreateSequential
RpcStringFreeW
Sections
.4CAA559 Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ