Static task
static1
Behavioral task
behavioral1
Sample
c028ed266755fa6a43d130143ad51ad78bb54b973ece6df779b6971efe5c4ca6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c028ed266755fa6a43d130143ad51ad78bb54b973ece6df779b6971efe5c4ca6.exe
Resource
win10v2004-20220812-en
General
-
Target
c028ed266755fa6a43d130143ad51ad78bb54b973ece6df779b6971efe5c4ca6
-
Size
171KB
-
MD5
5cde73988f1db59f278ef459c3c51da0
-
SHA1
c25032bb7d31cbd0549bc08289023456b7b9f5a7
-
SHA256
c028ed266755fa6a43d130143ad51ad78bb54b973ece6df779b6971efe5c4ca6
-
SHA512
297fa0ac1803a99f9669b4dc2a2c4b4429173be5a2a4c5df5ea11b5f9b5b512ab62889dc393212178f2465d65b5c045e365317f04736f66c4bd4962d5873a2b3
-
SSDEEP
3072:vGC0GLKi1olVledtDqoxGnveTBfT9IsCH:+op1o3U8FnveTBasCH
Malware Config
Signatures
Files
-
c028ed266755fa6a43d130143ad51ad78bb54b973ece6df779b6971efe5c4ca6.exe windows x86
31661183c6f51c8cf3be0fbba43c0c14
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpQueryInfoA
InternetSetOptionA
DeleteUrlCacheEntry
InternetGetCookieExA
InternetCloseHandle
InternetCanonicalizeUrlA
kernel32
lstrlenA
TlsGetValue
GetStringTypeA
GetCPInfo
lstrcpynA
FreeLibrary
LoadResource
CreateProcessW
HeapAlloc
SetUnhandledExceptionFilter
LoadLibraryExW
GetCurrentProcess
QueryPerformanceCounter
GetEnvironmentStringsW
WaitForSingleObject
SetEvent
GetModuleHandleW
GetTickCount
VirtualFree
GetSystemTimeAsFileTime
WriteFile
GetCommandLineA
InitializeCriticalSection
SetHandleCount
TlsSetValue
GetEnvironmentStrings
GetConsoleCP
WideCharToMultiByte
Sleep
HeapDestroy
LeaveCriticalSection
GetFileAttributesA
HeapCreate
GetFileAttributesW
TerminateProcess
FileTimeToSystemTime
ReadFile
GetModuleFileNameW
GetTimeZoneInformation
CreateFileW
GetEnvironmentVariableA
GetACP
MultiByteToWideChar
lstrlenW
FlushFileBuffers
RaiseException
GetLastError
SetLastError
lstrcmpiA
GetThreadLocale
HeapSize
EnterCriticalSection
FindClose
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
CreateFileMappingA
LocalAlloc
SetFilePointer
FindNextFileA
IsDebuggerPresent
GetStringTypeW
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
GetVersionExA
CloseHandle
GetVersion
GetCurrentProcessId
LocalFree
LCMapStringW
DeleteFileA
CreateDirectoryW
GetTempPathW
OpenMutexW
GetProcAddress
MoveFileW
GetModuleFileNameA
DeleteFileW
lstrcpyW
lstrcpyA
TerminateThread
lstrcatA
GetExitCodeThread
lstrcatW
CreateThread
GetLocaleInfoA
WriteConsoleW
GetConsoleOutputCP
RtlUnwind
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LCMapStringA
InitializeCriticalSectionAndSpinCount
TlsFree
TlsAlloc
IsValidCodePage
InterlockedDecrement
InterlockedIncrement
VirtualAlloc
GetConsoleMode
SetStdHandle
GetStdHandle
GetStartupInfoA
HeapReAlloc
HeapFree
FindFirstFileW
CreateFileA
ExitProcess
GetOEMCP
GetModuleHandleA
GetFileType
lstrcmpA
user32
IsWindow
SetWindowPos
GetSysColor
GetDesktopWindow
GetCursorPos
IsWindowVisible
PostQuitMessage
MsgWaitForMultipleObjects
wsprintfA
CharLowerW
wsprintfW
TranslateMessage
CreateWindowExA
DispatchMessageA
DestroyWindow
SetCursor
GetMessageA
SetCapture
GetSubMenu
SetForegroundWindow
SetFocus
SendMessageA
SetWindowLongA
MessageBoxA
InvalidateRect
PeekMessageA
ReleaseDC
EnableMenuItem
DefWindowProcA
gdi32
GetDeviceCaps
DeleteObject
SelectObject
SetTextColor
advapi32
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
shell32
SHGetFolderPathW
ole32
CoSetProxyBlanket
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
VariantInit
Sections
.text Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ