Static task
static1
Behavioral task
behavioral1
Sample
879ab70e54f9e49e3de34f15352aeee6189d984a7e651aec53f3209cd6f05cbb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
879ab70e54f9e49e3de34f15352aeee6189d984a7e651aec53f3209cd6f05cbb.exe
Resource
win10v2004-20220901-en
General
-
Target
879ab70e54f9e49e3de34f15352aeee6189d984a7e651aec53f3209cd6f05cbb
-
Size
43KB
-
MD5
a11fcf04db958dad0824331c894ff7af
-
SHA1
7ed94607cec3a056029d263a909166fe8b7725f6
-
SHA256
879ab70e54f9e49e3de34f15352aeee6189d984a7e651aec53f3209cd6f05cbb
-
SHA512
5d38ab2d9f787daf684663568033de0c34e6ddec44f18895e237767f354b8d35bfb7ebd626a146278fab5d0443a403d50418c81cb4a5d10c0b5645bb69cca447
-
SSDEEP
768:cj09R2PJd9Ma1n0tlmMqXj1ubeJi0hKsC5iW3XF6kASDdmg7:ckFv7mMqJJi00B3XskASDd
Malware Config
Signatures
Files
-
879ab70e54f9e49e3de34f15352aeee6189d984a7e651aec53f3209cd6f05cbb.exe windows x86
c7093e0e1b21d2497a560386b53a92a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcessModules
GetModuleFileNameExA
GetProcessImageFileNameA
userenv
GetAllUsersProfileDirectoryA
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
HttpSendRequestA
InternetReadFile
InternetSetOptionA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetQueryOptionA
InternetCrackUrlA
InternetOpenA
InternetConnectA
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
socket
shlwapi
wnsprintfA
kernel32
GetCurrentProcess
lstrcpynA
VirtualAllocEx
SystemTimeToFileTime
GetSystemDirectoryA
GetVolumeInformationA
Sleep
CreateThread
CopyFileA
lstrcpyA
lstrcmpiA
GetEnvironmentVariableA
lstrlenA
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
OpenProcess
Process32Next
GetCurrentProcessId
CloseHandle
Process32First
CreateToolhelp32Snapshot
CreateProcessA
VirtualAlloc
ResumeThread
SetThreadContext
GetThreadContext
WriteProcessMemory
TerminateProcess
SetUnhandledExceptionFilter
VirtualFree
lstrcatA
CreateRemoteThread
WaitForSingleObject
ReadFile
GetFileSize
CreateFileA
CreateMutexA
GetModuleFileNameA
GetLocalTime
QueryPerformanceCounter
ExitProcess
WriteFile
GetTempFileNameA
GetTickCount
TerminateThread
GetExitCodeProcess
WideCharToMultiByte
user32
wsprintfA
advapi32
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
OpenProcessToken
RegQueryValueExA
CryptReleaseContext
GetTokenInformation
CreateWellKnownSid
EqualSid
RegCloseKey
CryptDecrypt
CryptEncrypt
CryptAcquireContextA
CryptGenKey
CryptExportKey
CryptDestroyKey
CryptImportKey
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
StringFromCLSID
CoCreateInstance
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ