Static task
static1
Behavioral task
behavioral1
Sample
d2fd71cebf410172c6471b54ff292158e139bed7bb8514168afbbd51225ca6fe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d2fd71cebf410172c6471b54ff292158e139bed7bb8514168afbbd51225ca6fe.exe
Resource
win10v2004-20220812-en
General
-
Target
d2fd71cebf410172c6471b54ff292158e139bed7bb8514168afbbd51225ca6fe
-
Size
149KB
-
MD5
02714eeedd57bfe6c352a6eab965fb31
-
SHA1
8354c3a4b1c04dd5279415d00d8e210e1b2ad179
-
SHA256
d2fd71cebf410172c6471b54ff292158e139bed7bb8514168afbbd51225ca6fe
-
SHA512
b50fbc0661bcb75abeff88c6a7991a33ae45e5fa31df13bf2fe217afb2d1cd5e3f62f841690c594ad304e38b150a50764adbad3f36d34864909230a749b4bef5
-
SSDEEP
1536:Q9FX/kSS8Rr3/9ph8vVS22oCJIY0meA1SNxbJY2J+7jQ21nV2F7:gkSS2hbJI/NxbJY2J+7jQ21nwF7
Malware Config
Signatures
Files
-
d2fd71cebf410172c6471b54ff292158e139bed7bb8514168afbbd51225ca6fe.exe windows x86
921be8f4e76a4742f6b307da6c648bef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winhttp
WinHttpQueryHeaders
WinHttpSendRequest
WinHttpReadData
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpSetOption
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
shlwapi
StrToIntW
StrCpyW
StrStrIW
StrToIntExA
PathAddBackslashW
StrCatW
comctl32
InitCommonControlsEx
urlmon
URLDownloadToCacheFileW
kernel32
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
HeapFree
GetProcessHeap
IsWow64Process
GetCurrentProcess
GetVersionExW
CloseHandle
ReadFile
CreateFileW
GetFileSize
GetTickCount
GetLastError
WaitForSingleObject
CreateProcessW
lstrcatW
FreeLibrary
LoadLibraryExW
DeleteFileW
lstrcpyW
LeaveCriticalSection
EnterCriticalSection
lstrlenW
GlobalFree
lstrcmpiW
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
GetCurrentProcessId
GetModuleFileNameW
GetExitCodeThread
GetStringTypeA
Sleep
HeapAlloc
CreateEventW
WaitForMultipleObjects
ResumeThread
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
LoadLibraryW
lstrcmpiA
lstrlenA
lstrcatA
TerminateProcess
OpenProcess
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
lstrcpyA
FlushFileBuffers
WriteFile
SetFilePointer
RemoveDirectoryW
CreateDirectoryW
GetTempFileNameW
GetTempPathW
OpenFileMappingW
LocalFree
QueryPerformanceCounter
GetFileType
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapCreate
HeapReAlloc
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStringTypeW
LCMapStringA
LCMapStringW
CreateThread
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
GetStartupInfoA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
LoadLibraryA
user32
SetWindowTextW
GetDlgItemTextW
SetDlgItemTextW
LoadIconW
GetDlgItem
SendMessageW
GetWindowLongW
SetWindowLongW
wsprintfW
DestroyMenu
TrackPopupMenuEx
GetCursorPos
AppendMenuW
CreatePopupMenu
ShowWindow
DialogBoxParamW
SetTimer
gdi32
GetStockObject
CreateFontIndirectW
GetObjectW
advapi32
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ