Static task
static1
Behavioral task
behavioral1
Sample
44da959353abbba615f29e44b4df3c710676d2d633ef9b1d17eed3a9b6efdc56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
44da959353abbba615f29e44b4df3c710676d2d633ef9b1d17eed3a9b6efdc56.exe
Resource
win10v2004-20221111-en
General
-
Target
44da959353abbba615f29e44b4df3c710676d2d633ef9b1d17eed3a9b6efdc56
-
Size
299KB
-
MD5
2133d1e2d4c8d29e0448c4e6d9b92a1b
-
SHA1
d8b3596765943563eca1993271582d890f764d80
-
SHA256
44da959353abbba615f29e44b4df3c710676d2d633ef9b1d17eed3a9b6efdc56
-
SHA512
f6e5003818b61748ac36d532d36644cab5b5aad9bc698cc5672674924d0a9ed2ffa6aaed85ca857cb6557160e96b1b87a8c1126108d9a0778ece1e79fb368074
-
SSDEEP
6144:46+NMkjuxrcR4v/o8BAU8xEdspYPluV7vxb5iDpkH:YMkjyARG/o8B8xEuqlG7vqpkH
Malware Config
Signatures
Files
-
44da959353abbba615f29e44b4df3c710676d2d633ef9b1d17eed3a9b6efdc56.exe windows x86
da461bd06b8ba97adf989a5e97eb00d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetGetConnectedState
urlmon
URLDownloadToFileA
kernel32
HeapFree
GetProcessHeap
lstrcmpiA
lstrlenW
lstrlenA
GetModuleFileNameA
WriteFile
SetFilePointer
GetFileSize
SetFileAttributesA
WriteProcessMemory
ReadProcessMemory
OpenProcess
GetCurrentProcessId
GetVolumeInformationA
ReadFile
TerminateProcess
GetExitCodeProcess
FreeLibrary
GetProcAddress
LoadLibraryA
SuspendThread
ResumeThread
CreateProcessA
SetCurrentDirectoryA
ExitProcess
CompareStringA
CompareStringW
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpA
GetModuleHandleA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
GetCurrentThreadId
CreateDirectoryA
GetTempPathA
SetFileTime
SystemTimeToFileTime
FindClose
FindFirstFileA
SetEndOfFile
GetFullPathNameA
DeleteCriticalSection
FindNextFileA
GetTickCount
GetFileAttributesA
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
GetCPInfo
GetOEMCP
GetTimeZoneInformation
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
LCMapStringW
LCMapStringA
HeapSize
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
HeapReAlloc
GetDateFormatA
GetTimeFormatA
VirtualQuery
GetSystemInfo
VirtualAlloc
GetStringTypeA
VirtualProtect
RtlUnwind
GetSystemTimeAsFileTime
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsBadReadPtr
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
IsBadCodePtr
SetStdHandle
CreateFileA
Sleep
DeleteFileA
CloseHandle
InterlockedDecrement
InterlockedIncrement
FlushFileBuffers
RemoveDirectoryA
SetEnvironmentVariableA
user32
CharNextA
CreateWindowExA
GetClassNameA
SetWindowPos
LoadCursorA
GetParent
CreateAcceleratorTableA
GetClassInfoExA
DestroyWindow
RegisterClassExA
IsWindow
SendMessageA
DestroyAcceleratorTable
GetFocus
IsChild
GetWindow
SetFocus
BeginPaint
EndPaint
CallWindowProcA
GetDesktopWindow
InvalidateRgn
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
RegisterWindowMessageA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
PostMessageA
SystemParametersInfoA
RedrawWindow
InvalidateRect
GetClientRect
FillRect
ReleaseCapture
GetSysColor
GetDlgItem
MoveWindow
GetKeyState
DefWindowProcA
SetTimer
UnregisterClassA
KillTimer
MessageBoxA
WaitForInputIdle
EnumThreadWindows
ShowWindow
GetWindowRect
GetSystemMetrics
GetDC
ReleaseDC
GetWindowPlacement
IsWindowVisible
SetWindowPlacement
GetWindowLongA
SetWindowLongA
wsprintfA
SetCapture
gdi32
CreateSolidBrush
GetStockObject
GetObjectA
BitBlt
CreateCompatibleDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleBitmap
DeleteDC
comdlg32
GetOpenFileNameA
advapi32
RegCloseKey
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegDeleteKeyA
shell32
ExtractIconExA
SHGetSpecialFolderPathA
ole32
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoTaskMemRealloc
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
OleInitialize
CoCreateInstance
OleUninitialize
CreateStreamOnHGlobal
oleaut32
SysStringLen
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysFreeString
SysAllocString
SysAllocStringLen
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zylmix Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE