Static task
static1
Behavioral task
behavioral1
Sample
0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe
Resource
win10v2004-20220812-en
General
-
Target
0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c
-
Size
143KB
-
MD5
102d69aeb2780bd233cb0854ca9f60c4
-
SHA1
8d9ec5eeb5bc2ce8e3614dddcdfdc19fa5c08c90
-
SHA256
0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c
-
SHA512
6b46bcce6e05b76fa342d5ab8f919a15cd3319b5437cecb55705f413e675d8637607f3b52b31f4be7b725f84f324dc448f24cfea0335877234afacf8ce7d553c
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DQ:pe9IB83ID5M
Malware Config
Signatures
Files
-
0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe windows x86
dbe129d5088d493503666c0323721783
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winhttp
WinHttpSendRequest
WinHttpCrackUrl
WinHttpQueryHeaders
WinHttpReadData
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpReceiveResponse
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpSetOption
shlwapi
StrCpyW
StrStrIW
StrToIntExA
StrCatW
PathAddBackslashW
StrToIntW
comctl32
InitCommonControlsEx
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
kernel32
GetACP
GetCPInfo
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetLocaleInfoA
IsValidCodePage
HeapFree
GetProcessHeap
IsWow64Process
GetCurrentProcess
GetVersionExW
CloseHandle
GetFileSize
CreateFileW
GetTickCount
GetLastError
ReadFile
WaitForSingleObject
CreateProcessW
lstrcatW
FreeLibrary
DeleteFileW
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
lstrcmpiW
GetCommandLineW
lstrlenW
GlobalFree
lstrcpyW
MultiByteToWideChar
WideCharToMultiByte
GetExitCodeThread
CreateThread
Sleep
HeapAlloc
CreateEventExW
GetTempPathW
lstrcmpiA
lstrcatA
lstrlenA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetCurrentProcessId
GetModuleHandleW
WaitForMultipleObjects
ResumeThread
GetEnvironmentStringsW
TerminateProcess
OpenProcess
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
CreateDirectoryW
SetLastError
LocalFree
GetFileType
GetOEMCP
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ExitProcess
GetProcAddress
HeapCreate
HeapReAlloc
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
GetStringTypeA
GetStringTypeW
LCMapStringW
LCMapStringA
GetTempFileNameW
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
user32
LoadIconW
SetWindowTextW
DestroyMenu
SetDlgItemTextW
ShowWindow
SetTimer
GetDlgItem
SendMessageW
GetWindowLongW
SetWindowLongW
wsprintfW
TrackPopupMenuEx
GetCursorPos
AppendMenuW
CreatePopupMenu
DialogBoxParamW
GetDlgItemTextW
gdi32
GetStockObject
CreateFontIndirectW
GetObjectW
advapi32
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ