Static task
static1
Behavioral task
behavioral1
Sample
97e3054afe8f9066eef42976ca16f88af18a0441047f7dc5118fb3a4173803b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97e3054afe8f9066eef42976ca16f88af18a0441047f7dc5118fb3a4173803b1.exe
Resource
win10v2004-20220812-en
General
-
Target
97e3054afe8f9066eef42976ca16f88af18a0441047f7dc5118fb3a4173803b1
-
Size
44KB
-
MD5
48a92667db6485e85792af2882a7318e
-
SHA1
324fce9091b72c35faa6e2087f3c3588bd73e0f7
-
SHA256
97e3054afe8f9066eef42976ca16f88af18a0441047f7dc5118fb3a4173803b1
-
SHA512
08bb30e8198c204ec2be1babd421a7f86ef0feea88f17d189e0ba3a49a28f665deab7c9116826d99ff5d450bdd434b046aff4f6fbce71cade143095f8cf9d441
-
SSDEEP
768:qviTMCRBEwQBM6OX7D4blP8ZsKZ/MA+rCltAULZI9HRRl+MLKMfIMiwna:8iBkjOX7cblP8Zt5MZC8H
Malware Config
Signatures
Files
-
97e3054afe8f9066eef42976ca16f88af18a0441047f7dc5118fb3a4173803b1.exe windows x86
124cf52b12147010f3c6c349aa79eb20
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
mfc42
ord800
ord535
ord941
ord537
ord6930
ord4129
ord6928
ord858
ord4277
ord5683
ord940
ord2818
ord354
ord823
ord801
ord6883
ord6143
ord541
ord6283
ord6282
ord540
ord5861
ord551
ord3811
ord665
ord3790
ord860
ord1247
ord2820
ord837
ord920
ord3810
ord5216
ord4202
ord1105
ord6877
ord1575
ord825
msvcrt
strlen
_XcptFilter
sprintf
strcpy
memset
strcat
strncpy
memmove
memcpy
_strlwr
strncat
_snprintf
__CxxFrameHandler
strcmp
_strupr
_mbslwr
atol
strstr
_splitpath
_ftol
free
malloc
realloc
memcmp
_except_handler3
__dllonexit
_onexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_exit
__getmainargs
_acmdln
exit
_stricmp
_initterm
kernel32
GetStartupInfoA
lstrcatA
lstrcpyA
InitializeCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
WideCharToMultiByte
GetShortPathNameA
MultiByteToWideChar
lstrlenW
GetCommandLineA
WaitForSingleObject
lstrcmpiA
SetLastError
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetLastError
lstrlenA
Sleep
GetCurrentThreadId
GetTickCount
GetModuleFileNameA
GetWindowsDirectoryA
CreateDirectoryA
OutputDebugStringA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GlobalAlloc
GlobalFree
GetVersionExA
CreateFileA
DeviceIoControl
CloseHandle
GetModuleHandleA
GetProcAddress
FreeLibrary
user32
DispatchMessageA
TranslateMessage
GetMessageA
PostThreadMessageA
SetTimer
CharNextA
LoadStringA
KillTimer
advapi32
ControlService
QueryServiceStatus
RegEnumValueA
RegQueryInfoKeyA
DeleteService
OpenSCManagerA
CreateServiceA
ChangeServiceConfig2A
CloseServiceHandle
RegOpenKeyExA
RegCloseKey
RegSetValueExA
CreateProcessAsUserA
OpenProcessToken
OpenServiceA
RegDeleteKeyA
RegQueryValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegDeleteValueA
StartServiceCtrlDispatcherA
RegCreateKeyExA
RegEnumKeyExA
ole32
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
CoUninitialize
CoInitializeEx
CoTaskMemAlloc
oleaut32
SysFreeString
SysAllocString
RegisterTypeLi
VarUI4FromStr
LoadTypeLi
netapi32
Netbios
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ