Static task
static1
Behavioral task
behavioral1
Sample
90369da30869792d645942b52f97b16ad08fcb83fbcaa3f3cd2652a87e235498.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90369da30869792d645942b52f97b16ad08fcb83fbcaa3f3cd2652a87e235498.exe
Resource
win10v2004-20220901-en
General
-
Target
90369da30869792d645942b52f97b16ad08fcb83fbcaa3f3cd2652a87e235498
-
Size
348KB
-
MD5
eaea93076ad21033919b1d792720b866
-
SHA1
bfed4ff5d8727dbbc1ab7b7ae490daf05cff8fea
-
SHA256
90369da30869792d645942b52f97b16ad08fcb83fbcaa3f3cd2652a87e235498
-
SHA512
2a27eb5bae0895b560081a42235bbc4cca1bc6e8e00848ed76efcc3aab2f9a4cb2fffaa9ed9b98e531eaac6f25a50ed2a971932486ae2666693c61fbde0f57db
-
SSDEEP
6144:P+uNZ+0jML/WM5Eod3ESagCNwH1Luva1ZhfqHfaUUn+LzFDYBO+6vCmXy0Q8U7jL:P+uNQ0jML/WM5Eod3ESagCNwH1Luva14
Malware Config
Signatures
Files
-
90369da30869792d645942b52f97b16ad08fcb83fbcaa3f3cd2652a87e235498.exe windows x86
0a9f7870ec5ef14dda4c150ce8d67ff8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindow
advapi32
RegEnumValueA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
ws2_32
WSAStartup
WSACleanup
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetReadFile
HttpQueryInfoA
netapi32
NetUserGetInfo
NetApiBufferFree
kernel32
RtlUnwind
CompareStringW
CompareStringA
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
HeapReAlloc
VirtualAlloc
GetLocaleInfoA
GetCommandLineA
GetCompressedFileSizeA
CloseHandle
UnlockFile
WriteFile
LockFile
SetFilePointer
ReadFile
CreateFileA
GetLogicalDriveStringsA
CreateMutexA
ExitProcess
OpenMutexA
Sleep
CreateProcessA
CopyFileA
GetModuleFileNameA
GetEnvironmentVariableA
GetShortPathNameA
GetCurrentProcess
MultiByteToWideChar
SetEnvironmentVariableA
CreateThread
SetFileAttributesA
GetLastError
CreateDirectoryA
GetLocalTime
GetVolumeInformationA
GetDriveTypeA
DeleteCriticalSection
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
GetProcAddress
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
HeapFree
SetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetFullPathNameA
GetCurrentDirectoryA
HeapAlloc
FlushFileBuffers
SetHandleCount
GetStdHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RaiseException
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE