Static task
static1
Behavioral task
behavioral1
Sample
85615813a3c1ef653b37087ab4ebbf137e1da6d756fb17baa3785bb327f82fef.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
85615813a3c1ef653b37087ab4ebbf137e1da6d756fb17baa3785bb327f82fef.exe
Resource
win10v2004-20221111-en
General
-
Target
85615813a3c1ef653b37087ab4ebbf137e1da6d756fb17baa3785bb327f82fef
-
Size
356KB
-
MD5
8c7f4679b39d99a9fcd36049e483bfa4
-
SHA1
f60cc17d80c1bff706e105b1c88de310a2dd6c80
-
SHA256
85615813a3c1ef653b37087ab4ebbf137e1da6d756fb17baa3785bb327f82fef
-
SHA512
e72c45b88bf366793d1f6e6bd6575dbe3f5b770d96ac7e1b1de3cac4d26a142b1551cce360af90a78d65dbdba499c921f85e6a0a8e7fa1c66311b8c564ebc9d6
-
SSDEEP
6144:I8CAneiGnjEPl40Ife35qqy8BoNVwxS+Iv6rfE4STFNXyX7FNXyXNV8rgP:LneDEd40Ife35qq9BnxSfv6rf+Xy7XyR
Malware Config
Signatures
Files
-
85615813a3c1ef653b37087ab4ebbf137e1da6d756fb17baa3785bb327f82fef.exe windows x86
85e962c7a7259e38ac06ddd4cc8fea2d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetGetConnectedState
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetAttemptConnect
InternetConnectA
InternetOpenA
urlmon
URLDownloadToFileA
kernel32
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapFree
GetProcessHeap
lstrcmpiA
lstrlenW
lstrlenA
GetModuleFileNameA
WriteFile
SetFilePointer
GetFileSize
SetFileAttributesA
WriteProcessMemory
ReadProcessMemory
OpenProcess
GetCurrentProcessId
GetVolumeInformationA
ReadFile
CreateThread
GetCurrentThreadId
TerminateProcess
GetExitCodeProcess
FreeLibrary
GetProcAddress
LoadLibraryA
SuspendThread
ResumeThread
CreateProcessA
SetCurrentDirectoryA
ExitProcess
CopyFileA
CompareStringA
CompareStringW
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpA
GetModuleHandleA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
GetThreadLocale
GetTempPathA
SetFileTime
SystemTimeToFileTime
FindClose
FindFirstFileA
SetEndOfFile
WaitForSingleObject
SetEvent
CreateEventA
GetFullPathNameA
RemoveDirectoryA
FindNextFileA
GetTickCount
GetFileAttributesA
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
HeapSize
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
HeapReAlloc
GetDateFormatA
GetTimeFormatA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
LCMapStringA
RtlUnwind
GetSystemTimeAsFileTime
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetOEMCP
GetCPInfo
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetLocaleInfoA
GetACP
InterlockedExchange
CreateFileA
Sleep
DeleteFileA
CloseHandle
InterlockedDecrement
InterlockedIncrement
SetHandleCount
GetFileType
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
CreateDirectoryA
SetEnvironmentVariableA
user32
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
SetWindowPos
DestroyWindow
RedrawWindow
IsWindow
SendMessageA
CreateWindowExA
GetFocus
IsChild
GetWindow
SetFocus
BeginPaint
EndPaint
RegisterClassExA
GetDesktopWindow
InvalidateRgn
LoadCursorA
DestroyAcceleratorTable
GetClassInfoExA
GetClientRect
FillRect
SetCapture
ReleaseCapture
GetSysColor
GetDlgItem
MoveWindow
GetKeyState
DefWindowProcA
SetTimer
UnregisterClassA
KillTimer
MessageBoxA
WaitForInputIdle
SetWindowTextA
GetWindowTextA
SystemParametersInfoA
PostMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
CallWindowProcA
GetWindowTextLengthA
EnumThreadWindows
ShowWindow
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
InvalidateRect
GetWindowRect
GetSystemMetrics
GetDC
ReleaseDC
GetWindowPlacement
IsWindowVisible
SetWindowPlacement
GetWindowLongA
SetWindowLongA
wsprintfA
UpdateWindow
gdi32
CreateSolidBrush
GetStockObject
GetObjectA
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
GetDeviceCaps
DeleteObject
comdlg32
GetOpenFileNameA
advapi32
RegCloseKey
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegDeleteKeyA
shell32
ExtractIconExA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
OleInitialize
StringFromGUID2
OleUninitialize
CoTaskMemAlloc
OleLockRunning
CreateStreamOnHGlobal
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
CoTaskMemRealloc
oleaut32
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
VarUI4FromStr
Sections
.text Size: 224KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zylmix Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE