Static task
static1
Behavioral task
behavioral1
Sample
d1490b41cd5e316bb043f36bf83858a047d61d5fd23c1509e52377a0bc186ec5.exe
Resource
win7-20221111-en
General
-
Target
d1490b41cd5e316bb043f36bf83858a047d61d5fd23c1509e52377a0bc186ec5
-
Size
233KB
-
MD5
66f62f39f47eeaf869209ee0a3ab50db
-
SHA1
2f239808e095f81d718c5c1c6ec2e1ff8eef3b8f
-
SHA256
d1490b41cd5e316bb043f36bf83858a047d61d5fd23c1509e52377a0bc186ec5
-
SHA512
072ea7f5e8e4ed05f03c15de0174e29fb7c91474c86563a0da4fc1ca939ca9c55a54af4ca010600e00c7e00420caa5c561bced6adbb3e6838bd290020d354bbd
-
SSDEEP
3072:jMlo8HHizcwPxahtPy8RANYZjikCplK6PufjZqMNvYIZo25EHhsSDaCpfjOL0xpY:Oo8HCzcwchtKDN+pkivv2EWsSDryLsJq
Malware Config
Signatures
Files
-
d1490b41cd5e316bb043f36bf83858a047d61d5fd23c1509e52377a0bc186ec5.exe windows x86
02e5daee40d2922f9c544765c1e88296
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
GlobalAlloc
MultiByteToWideChar
ReadFile
CloseHandle
WaitForSingleObject
CreateProcessA
SetHandleInformation
CreatePipe
CreateDirectoryA
GetSystemWindowsDirectoryA
FindClose
FindFirstFileA
GetModuleHandleA
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExA
GetThreadLocale
DeleteCriticalSection
GetLongPathNameA
GetShortPathNameA
GetLastError
CreateFileA
lstrlenW
SetEnvironmentVariableW
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetTimeZoneInformation
GetModuleFileNameA
GetTickCount
LoadLibraryA
GetProcAddress
InitializeCriticalSection
FreeLibrary
LCMapStringW
LCMapStringA
FlushFileBuffers
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
GetFileType
GetStartupInfoA
GetCommandLineA
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetStringTypeW
WriteFile
SetStdHandle
SetHandleCount
GetStdHandle
GetFileAttributesA
SetEndOfFile
SetFilePointer
RtlUnwind
VirtualQuery
GetOEMCP
GetCPInfo
HeapSize
GetExitCodeProcess
user32
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
CreateWindowExA
RegisterClassA
LoadCursorA
wsprintfA
MessageBoxA
DefWindowProcA
advapi32
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyA
ole32
StringFromCLSID
CoTaskMemFree
wsock32
ntohs
listen
recv
getsockname
bind
socket
ioctlsocket
htons
connect
send
WSAGetLastError
WSAStartup
closesocket
WSAAsyncSelect
accept
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.srdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE