Static task
static1
Behavioral task
behavioral1
Sample
750647275297df3a37d5fb27c42716a04f652bf2d5b544f67f166014545b554a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
750647275297df3a37d5fb27c42716a04f652bf2d5b544f67f166014545b554a.exe
Resource
win10v2004-20220812-en
General
-
Target
750647275297df3a37d5fb27c42716a04f652bf2d5b544f67f166014545b554a
-
Size
223KB
-
MD5
3f609c5618da784c87be96671613a343
-
SHA1
95c708d3790e621db2e660bd80a6f0942be60526
-
SHA256
750647275297df3a37d5fb27c42716a04f652bf2d5b544f67f166014545b554a
-
SHA512
d877af072727e915fcd9a57c275a88ad1a4d8537c5198cc3cbd63e6059057f9b041c5422683ef64d19595e83f1d75ea81ef93be2d9bd753d5c151b62bdab5715
-
SSDEEP
3072:8Itu52uqpiMSbggZVyQZVbnYTdHJ0KRuX28PpWE+Fj2a119B6RRRRRRRRRRRRRR9:8Mt63bnvZVbYTdHSFpj8X11vWd
Malware Config
Signatures
Files
-
750647275297df3a37d5fb27c42716a04f652bf2d5b544f67f166014545b554a.exe windows x86
60eda45ed9195e2968758b61b6601296
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
ReadFile
WriteFile
DeleteFileW
GetLastError
GetModuleFileNameW
GetTempPathW
GetTempFileNameW
FindResourceW
SizeofResource
LoadResource
LockResource
GetVersionExW
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
CloseHandle
CreateProcessW
GetCurrentProcessId
WideCharToMultiByte
FlushFileBuffers
FindResourceExW
GetModuleHandleW
GetProcAddress
Sleep
ReleaseMutex
GetNativeSystemInfo
InterlockedDecrement
GetPriorityClass
Module32FirstW
HeapDestroy
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
IsProcessorFeaturePresent
GetFileSize
CreateFileW
GetFileAttributesW
GetSystemTime
HeapFree
MultiByteToWideChar
GetProcessHeap
HeapAlloc
GetCommandLineW
lstrlenW
LocalFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
HeapCreate
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
ExitProcess
SetUnhandledExceptionFilter
LCMapStringW
GetCPInfo
RtlUnwind
GetCurrentThreadId
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
InterlockedExchange
GetStringTypeW
InterlockedIncrement
user32
ShowWindow
GetDlgItem
PeekMessageW
SendMessageW
CreateDialogParamW
PostQuitMessage
GetMessageW
TranslateMessage
DispatchMessageW
wvsprintfW
advapi32
GetCurrentHwProfileW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
ole32
CoInitialize
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
oleaut32
SysStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
SysAllocStringByteLen
VariantClear
SysAllocString
VariantInit
VarBstrCat
VariantChangeType
shlwapi
StrCmpW
StrToIntExW
PathFileExistsW
winhttp
WinHttpConnect
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpSetOption
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpenRequest
rpcrt4
UuidToStringW
UuidEqual
UuidCreate
UuidCreateSequential
RpcStringFreeW
Sections
.4CAA559 Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ