Static task
static1
Behavioral task
behavioral1
Sample
d0de6d7b9e01c2123061f41a857ab9a8275ed2534aabb11dea93ee024b570bb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0de6d7b9e01c2123061f41a857ab9a8275ed2534aabb11dea93ee024b570bb0.exe
Resource
win10v2004-20220812-en
General
-
Target
d0de6d7b9e01c2123061f41a857ab9a8275ed2534aabb11dea93ee024b570bb0
-
Size
143KB
-
MD5
3cd211206d0f1368b7db06fdd87089ec
-
SHA1
466efe949faf93aae0e2e4fc9c8bfdf08608601e
-
SHA256
d0de6d7b9e01c2123061f41a857ab9a8275ed2534aabb11dea93ee024b570bb0
-
SHA512
094e7c94d7ac15409106cde84386ef6b49cae4ba678d5aea001106e1950438ea6d364e380dab36670176663dae8da087c023f8a522d89f156678f673943d6481
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45Dl:pe9IB83ID5x
Malware Config
Signatures
Files
-
d0de6d7b9e01c2123061f41a857ab9a8275ed2534aabb11dea93ee024b570bb0.exe windows x86
dbe129d5088d493503666c0323721783
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winhttp
WinHttpSendRequest
WinHttpCrackUrl
WinHttpQueryHeaders
WinHttpReadData
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpReceiveResponse
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpSetOption
shlwapi
StrCpyW
StrStrIW
StrToIntExA
StrCatW
PathAddBackslashW
StrToIntW
comctl32
InitCommonControlsEx
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
kernel32
GetACP
GetCPInfo
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetLocaleInfoA
IsValidCodePage
HeapFree
GetProcessHeap
IsWow64Process
GetCurrentProcess
GetVersionExW
CloseHandle
GetFileSize
CreateFileW
GetTickCount
GetLastError
ReadFile
WaitForSingleObject
CreateProcessW
lstrcatW
FreeLibrary
DeleteFileW
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
lstrcmpiW
GetCommandLineW
lstrlenW
GlobalFree
lstrcpyW
MultiByteToWideChar
WideCharToMultiByte
GetExitCodeThread
CreateThread
Sleep
HeapAlloc
CreateEventExW
GetTempPathW
lstrcmpiA
lstrcatA
lstrlenA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetCurrentProcessId
GetModuleHandleW
WaitForMultipleObjects
ResumeThread
GetEnvironmentStringsW
TerminateProcess
OpenProcess
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
CreateDirectoryW
SetLastError
LocalFree
GetFileType
GetOEMCP
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ExitProcess
GetProcAddress
HeapCreate
HeapReAlloc
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
GetStringTypeA
GetStringTypeW
LCMapStringW
LCMapStringA
GetTempFileNameW
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
user32
LoadIconW
SetWindowTextW
DestroyMenu
SetDlgItemTextW
ShowWindow
SetTimer
GetDlgItem
SendMessageW
GetWindowLongW
SetWindowLongW
wsprintfW
TrackPopupMenuEx
GetCursorPos
AppendMenuW
CreatePopupMenu
DialogBoxParamW
GetDlgItemTextW
gdi32
GetStockObject
CreateFontIndirectW
GetObjectW
advapi32
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ