Static task
static1
Behavioral task
behavioral1
Sample
946f74f3ba6864aef8d825e2630899efc48f426e895dbf549eb6b9a1cc17d3cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
946f74f3ba6864aef8d825e2630899efc48f426e895dbf549eb6b9a1cc17d3cf.exe
Resource
win10v2004-20220901-en
General
-
Target
946f74f3ba6864aef8d825e2630899efc48f426e895dbf549eb6b9a1cc17d3cf
-
Size
39KB
-
MD5
f2fc6fdd970f67f5b3534876e1118d9d
-
SHA1
70cacab07cd8a568ecd36b80d75bff5d9cbf54c3
-
SHA256
946f74f3ba6864aef8d825e2630899efc48f426e895dbf549eb6b9a1cc17d3cf
-
SHA512
056f9611b4f8504e4d9b82adc99ab0f9dcd948f0f8d6852a7ff426e2f75413a70d732cb8c81969bfe6b64f6aab9fc8714a84798f2598918d256376d854d2476f
-
SSDEEP
768:UTG+TgCGIIHNsZcC++c/P1xOjM27H1ss6TuMjX1IkX1i:UTG+cCGIIHNRtnOjM0H1spTuMJIkX1
Malware Config
Signatures
Files
-
946f74f3ba6864aef8d825e2630899efc48f426e895dbf549eb6b9a1cc17d3cf.exe windows x86
6cbfad13580c2dde0776fb5b5f68378c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetModuleFileNameW
lstrcmpiW
GetVolumeInformationW
GetSystemTimeAsFileTime
GetCurrentProcessId
Sleep
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
CreateProcessW
CloseHandle
GetCurrentThreadId
InterlockedCompareExchange
InterlockedExchange
user32
EnumChildWindows
PostMessageW
GetWindowThreadProcessId
SetWindowPos
GetClassNameW
FindWindowExW
EnumWindows
GetWindowLongW
advapi32
RegCloseKey
RegOpenKeyExW
RegSetValueExW
msvcr80
_time64
_amsg_exit
srand
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
rand
vsprintf_s
??_U@YAPAXI@Z
mbstowcs
??2@YAPAXI@Z
??3@YAXPAX@Z
__getmainargs
memset
msvcp80
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
wininet
InternetQueryOptionW
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ