Static task
static1
Behavioral task
behavioral1
Sample
b15d63060e779c54125972dda7beb6b59aaed20da9033a9a0d425166342b2fea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b15d63060e779c54125972dda7beb6b59aaed20da9033a9a0d425166342b2fea.exe
Resource
win10v2004-20221111-en
General
-
Target
b15d63060e779c54125972dda7beb6b59aaed20da9033a9a0d425166342b2fea
-
Size
38KB
-
MD5
ab65f23875aa5644b1a4e48855087f48
-
SHA1
9b7e33b3102d71e626744fe9e25a06b9be99f0c9
-
SHA256
b15d63060e779c54125972dda7beb6b59aaed20da9033a9a0d425166342b2fea
-
SHA512
1cef884c74a602f1ac6c6c3eabafda6820dd4d3cb871963fff5c9a9712317b7e5d8a0e37dc8432daf4cd6ed6c0ac572804f5131ddcaf684f595693f4ecd61eb5
-
SSDEEP
768:E6YAPZVmydoS8C1UjKvEBWZHD0xP+fITBTGx:ERAJUWMBMj+TBTG
Malware Config
Signatures
Files
-
b15d63060e779c54125972dda7beb6b59aaed20da9033a9a0d425166342b2fea.exe windows x86
a27e3b4f5eaca6e2e15874940fbce5f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
GetModuleFileNameW
CreateFileW
CloseHandle
GetLocaleInfoW
lstrlenA
WriteFile
WideCharToMultiByte
lstrcpynW
lstrlenW
lstrcatW
lstrcpyW
GetTickCount
MultiByteToWideChar
LocalFree
SetFilePointer
SystemTimeToFileTime
SetFileTime
CopyFileW
GetCurrentDirectoryW
LocalFileTimeToFileTime
FreeLibrary
CreateProcessW
LoadLibraryW
TerminateProcess
ExitThread
lstrcmpW
GetProcAddress
CreateThread
GetComputerNameA
LocalSize
GetSystemTime
SetWaitableTimer
CancelWaitableTimer
CreateWaitableTimerW
MoveFileExW
Sleep
GetFileSize
WaitForSingleObject
CreateMutexW
ExitProcess
DeleteFileW
LocalAlloc
GetTempPathW
CreateDirectoryW
GetFileAttributesW
GetTempFileNameW
user32
SendMessageA
EnumWindows
SetSysColors
SystemParametersInfoW
ExitWindowsEx
FindWindowExW
SendMessageW
GetWindowThreadProcessId
wsprintfW
RealGetWindowClassW
ShowWindow
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegFlushKey
RegSetValueExW
RegQueryValueExA
shell32
SHGetFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoInitializeEx
ntdll
wcsstr
wcsncpy
_allmul
NtQueryVirtualMemory
memset
RtlUnwind
memcpy
wininet
InternetOpenW
InternetCloseHandle
InternetAttemptConnect
InternetReadFile
InternetOpenUrlW
InternetQueryOptionW
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ