Static task
static1
Behavioral task
behavioral1
Sample
43057d5a11473989fad72246f171d67b54431a52be4026f2dced635e3ffeae5f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
43057d5a11473989fad72246f171d67b54431a52be4026f2dced635e3ffeae5f.exe
Resource
win10v2004-20221111-en
General
-
Target
43057d5a11473989fad72246f171d67b54431a52be4026f2dced635e3ffeae5f
-
Size
149KB
-
MD5
8b1cf6422114a6e5c45a6bfb620517a2
-
SHA1
5805a2c3644fccd9a06cff0ac61de4058f14c642
-
SHA256
43057d5a11473989fad72246f171d67b54431a52be4026f2dced635e3ffeae5f
-
SHA512
3791a8aeb6befb1d8c1c61f2e7a591f8c063b56e07d561dffd324bf72b2a7aa3dfc4d7f270be17003d752ba424b2e332fe8f0249af3e5e54c043a2289e34ec32
-
SSDEEP
1536:Q9FX/kSS8Rr3/9ph8vVS22oCJIY0meA1SNxbJY2J+7jQ21nVG:gkSS2hbJI/NxbJY2J+7jQ21nU
Malware Config
Signatures
Files
-
43057d5a11473989fad72246f171d67b54431a52be4026f2dced635e3ffeae5f.exe windows x86
921be8f4e76a4742f6b307da6c648bef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winhttp
WinHttpQueryHeaders
WinHttpSendRequest
WinHttpReadData
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpSetOption
WinHttpReceiveResponse
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
shlwapi
StrToIntW
StrCpyW
StrStrIW
StrToIntExA
PathAddBackslashW
StrCatW
comctl32
InitCommonControlsEx
urlmon
URLDownloadToCacheFileW
kernel32
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
HeapFree
GetProcessHeap
IsWow64Process
GetCurrentProcess
GetVersionExW
CloseHandle
ReadFile
CreateFileW
GetFileSize
GetTickCount
GetLastError
WaitForSingleObject
CreateProcessW
lstrcatW
FreeLibrary
LoadLibraryExW
DeleteFileW
lstrcpyW
LeaveCriticalSection
EnterCriticalSection
lstrlenW
GlobalFree
lstrcmpiW
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
GetCurrentProcessId
GetModuleFileNameW
GetExitCodeThread
GetStringTypeA
Sleep
HeapAlloc
CreateEventW
WaitForMultipleObjects
ResumeThread
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
LoadLibraryW
lstrcmpiA
lstrlenA
lstrcatA
TerminateProcess
OpenProcess
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
lstrcpyA
FlushFileBuffers
WriteFile
SetFilePointer
RemoveDirectoryW
CreateDirectoryW
GetTempFileNameW
GetTempPathW
OpenFileMappingW
LocalFree
QueryPerformanceCounter
GetFileType
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapCreate
HeapReAlloc
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStringTypeW
LCMapStringA
LCMapStringW
CreateThread
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
GetStartupInfoA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
LoadLibraryA
user32
SetWindowTextW
GetDlgItemTextW
SetDlgItemTextW
LoadIconW
GetDlgItem
SendMessageW
GetWindowLongW
SetWindowLongW
wsprintfW
DestroyMenu
TrackPopupMenuEx
GetCursorPos
AppendMenuW
CreatePopupMenu
ShowWindow
DialogBoxParamW
SetTimer
gdi32
GetStockObject
CreateFontIndirectW
GetObjectW
advapi32
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ