Static task
static1
Behavioral task
behavioral1
Sample
1988a3cdee0238077e90c4225ebf462519d9dedc953b4438c724706e2cdd395b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1988a3cdee0238077e90c4225ebf462519d9dedc953b4438c724706e2cdd395b.exe
Resource
win10v2004-20220812-en
General
-
Target
1988a3cdee0238077e90c4225ebf462519d9dedc953b4438c724706e2cdd395b
-
Size
244KB
-
MD5
9b48f6e519ca4674ed27dd790872cc3a
-
SHA1
9dfb104e3c135d0e52a98db9ccd84af8917778c4
-
SHA256
1988a3cdee0238077e90c4225ebf462519d9dedc953b4438c724706e2cdd395b
-
SHA512
b6a0ea858d756f26a1341d1d5c5a1678b375ba654bbf42c41566e9a71a4c41109394963d676b345f64f66a922503519bea5899f5631e9f822789c3e256834c76
-
SSDEEP
6144:AeoMA3kvqywVP/8zl0fL5SFGvdzRMjJBX3mox:wyKPkzKfFSFGvdzRMj5
Malware Config
Signatures
Files
-
1988a3cdee0238077e90c4225ebf462519d9dedc953b4438c724706e2cdd395b.exe windows x86
2c1bc1d5073a30d79533d069e315c956
Code Sign
d3:3c:9c:81:34:bf:cb:0c:e8:97:42:c2:66:c5:57:bc:5e:f9:28:37Signer
Actual PE Digestd3:3c:9c:81:34:bf:cb:0c:e8:97:42:c2:66:c5:57:bc:5e:f9:28:37Digest Algorithmsha1PE Digest MatchesfalseTrustedfalseSigning CertificateNO CERTIFICATEHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winhttp
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpOpen
kernel32
DeleteFileW
GetSystemTimeAsFileTime
GetModuleHandleW
CreateProcessW
FindFirstFileW
SystemTimeToFileTime
WideCharToMultiByte
GetFileAttributesW
MultiByteToWideChar
GetFileSizeEx
FindClose
FindNextFileW
GetSystemTime
GetVersionExA
GetFullPathNameW
SetEvent
CloseHandle
InterlockedDecrement
FreeLibrary
GetCurrentProcess
LoadLibraryW
GetProcAddress
CreateFileA
SetStdHandle
RemoveDirectoryW
GetTempPathW
CreateFileW
ReadFile
WriteFile
CreateDirectoryW
GetFileSize
GetTempFileNameW
GetLastError
SetEndOfFile
GetCurrentProcessId
GetStringTypeA
CreateEventW
WriteConsoleA
WriteConsoleW
GetConsoleOutputCP
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTickCount
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
RaiseException
RtlUnwind
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeW
HeapAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
GetACP
GetOEMCP
IsValidCodePage
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
GetModuleFileNameW
user32
LoadStringW
advapi32
SetServiceStatus
StartServiceCtrlDispatcherW
ControlService
ChangeServiceConfigW
ChangeServiceConfig2W
StartServiceA
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyExW
RegisterServiceCtrlHandlerW
shell32
SHFileOperationW
SHGetFolderPathW
ole32
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitializeSecurity
CoInitialize
CoInitializeEx
StringFromGUID2
oleaut32
SysFreeString
VariantClear
SysAllocString
VariantInit
Sections
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ