Static task
static1
Behavioral task
behavioral1
Sample
77005d734b56df9f58956b97d8b6db3463ccbcbe6a641a6bf52b5ce3de046fb1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
77005d734b56df9f58956b97d8b6db3463ccbcbe6a641a6bf52b5ce3de046fb1.exe
Resource
win10v2004-20221111-en
General
-
Target
77005d734b56df9f58956b97d8b6db3463ccbcbe6a641a6bf52b5ce3de046fb1
-
Size
213KB
-
MD5
8b4e262734a2735c4894426a314580c0
-
SHA1
1130daa334ced68296aa040d404209794e30fff5
-
SHA256
77005d734b56df9f58956b97d8b6db3463ccbcbe6a641a6bf52b5ce3de046fb1
-
SHA512
5d10abebfae248967c0e03e6cf4a941505a4009184c393f1de20e60ac4da3d0f7c829be82811adfc85c18a36a9e2779b48a651a06fd78d2c64fe88feb4708a84
-
SSDEEP
6144:KZOdbGgUay4S5AttR7cUJu4ASQCD4T+ZDkIm9:Kodb3y5gb7cUMmciZpm
Malware Config
Signatures
Files
-
77005d734b56df9f58956b97d8b6db3463ccbcbe6a641a6bf52b5ce3de046fb1.exe windows x86
97a8c3c61a958af337d35322e5fbf977
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFileExW
InternetAttemptConnect
FtpGetFileA
InternetSetCookieW
HttpSendRequestExW
kernel32
HeapQueryInformation
SetEnvironmentVariableA
GetStdHandle
GetSystemTimeAsFileTime
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetLastError
GetProcAddress
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapSize
HeapFree
HeapReAlloc
WideCharToMultiByte
GetTimeZoneInformation
CreateFileW
CloseHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sleep
RtlUnwind
LoadLibraryW
CompareStringW
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
grvujwj Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
auvlgui Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE