Static task
static1
Behavioral task
behavioral1
Sample
tmp0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp0.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
tmp1.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
tmp1.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
tmp2.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
tmp2.exe
Resource
win10v2004-20220812-en
General
-
Target
cca18cdaf2fa3ac68f534e5ea03befab7a3cb110940bd4d99918675a5a8cdf22
-
Size
25KB
-
MD5
f3634842635a0ba55675db40de58a79b
-
SHA1
5c93ae49719096efef9de1526843a8b75fa6a623
-
SHA256
cca18cdaf2fa3ac68f534e5ea03befab7a3cb110940bd4d99918675a5a8cdf22
-
SHA512
dd83a6d5549121b3d6e847837f4b52523404f99c02905489a0c095ee91333d132b5bb807f6f88947ee0adf5edf08371b5188d76401660877ce18e9371169dc2a
-
SSDEEP
768:kpZlnIgZ+MNGM60LepZlnIgZ+MNGM60LnpZlnIgZ+MNGM60LM:yChM60sChM609ChM60Q
Malware Config
Signatures
Files
-
cca18cdaf2fa3ac68f534e5ea03befab7a3cb110940bd4d99918675a5a8cdf22.rar
-
tmp0.exe.exe windows x86
224311aa6b21d66209b7612d4eb83ae0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
msvcrt
memset
shlwapi
SHGetValueA
wininet
InternetCrackUrlA
user32
wvsprintfA
ole32
CoInitialize
oleaut32
SysFreeString
Sections
.text Size: 6KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
tmp1.exe.exe windows x86
224311aa6b21d66209b7612d4eb83ae0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
msvcrt
memset
shlwapi
SHGetValueA
wininet
InternetCrackUrlA
user32
wvsprintfA
ole32
CoInitialize
oleaut32
SysFreeString
Sections
.text Size: 6KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
tmp2.exe.exe windows x86
224311aa6b21d66209b7612d4eb83ae0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
msvcrt
memset
shlwapi
SHGetValueA
wininet
InternetCrackUrlA
user32
wvsprintfA
ole32
CoInitialize
oleaut32
SysFreeString
Sections
.text Size: 6KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE