Static task
static1
Behavioral task
behavioral1
Sample
d0c39866807a949e2c4f36a8243e8276472d3eff9704b2089eb5773fa0bb07db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0c39866807a949e2c4f36a8243e8276472d3eff9704b2089eb5773fa0bb07db.exe
Resource
win10v2004-20220901-en
General
-
Target
d0c39866807a949e2c4f36a8243e8276472d3eff9704b2089eb5773fa0bb07db
-
Size
29KB
-
MD5
6776acaf37a89f14bfdc862b9cc85b82
-
SHA1
fefd4864fe2f5d9c216f8d90b2be3c1c132551ce
-
SHA256
d0c39866807a949e2c4f36a8243e8276472d3eff9704b2089eb5773fa0bb07db
-
SHA512
0f043c7e7ac205b07df2301696e3220cbea6489490d782cc2d58c8727df9464c758ca024df7b74f8f6c17e26692aa7d5d6ba53862cc09df620db3694e8453de1
-
SSDEEP
384:+KCff/OUWNgwMzAL8coyHX40WuMGHiowMkkUOHcUvIavQFS3QZ7S:+ffKNgnz4XxMYioFkcH/US3iS
Malware Config
Signatures
Files
-
d0c39866807a949e2c4f36a8243e8276472d3eff9704b2089eb5773fa0bb07db.exe windows x86
0bac7eac5fe19af564fe9a5e571b485c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_except_handler3
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
free
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
strstr
??2@YAPAXI@Z
realloc
srand
rand
malloc
memset
memcpy
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
DeleteUrlCacheEntry
shlwapi
PathFileExistsW
PathAppendW
kernel32
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
CreateThread
GetExitCodeThread
TerminateThread
lstrcpyA
lstrcpyW
CloseHandle
GetVersionExA
ReleaseMutex
CreateMutexA
lstrcatW
QueryPerformanceCounter
LoadLibraryA
GetProcAddress
SetLastError
GetLastError
lstrlenW
MultiByteToWideChar
CreateFileW
GetSystemDirectoryA
GetModuleFileNameW
Sleep
WideCharToMultiByte
WriteFile
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
CreateFileMappingA
lstrcatA
ExitProcess
CreateFileA
GetFileSize
lstrcmpA
lstrlenA
MapViewOfFile
UnmapViewOfFile
lstrcpynA
CreateProcessW
GetCurrentProcess
WaitForSingleObject
IsDebuggerPresent
user32
LoadIconA
MsgWaitForMultipleObjects
KillTimer
PostQuitMessage
RegisterClassExA
SetTimer
GetMessageA
MessageBoxA
CharLowerW
TranslateMessage
LoadCursorA
DispatchMessageA
DefWindowProcA
wsprintfA
PeekMessageA
CreateWindowExA
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
shell32
SHGetFolderPathW
oleaut32
VariantInit
VariantClear
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ