Static task
static1
Behavioral task
behavioral1
Sample
11779d13928332d2cfdee74de22501abddbe5c8b6af3104a806a2d1dc15ba2bc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
11779d13928332d2cfdee74de22501abddbe5c8b6af3104a806a2d1dc15ba2bc.exe
Resource
win10v2004-20221111-en
General
-
Target
11779d13928332d2cfdee74de22501abddbe5c8b6af3104a806a2d1dc15ba2bc
-
Size
80KB
-
MD5
b208f5ddbeec0e078ccb3fb154f5b894
-
SHA1
f4fee6833d1aa1b781a123ce717db2a6d0edaf6e
-
SHA256
11779d13928332d2cfdee74de22501abddbe5c8b6af3104a806a2d1dc15ba2bc
-
SHA512
90af6e93a344cd2a4382f355d6a5ee21f5280e6c1984e42c580d516b90bdac19e210d9f777d3a909f2ba2fb0af976843c3f641d9aa6ba25f731c99de7bc5faca
-
SSDEEP
1536:jB5/KZKvmpGliTHF4bJM9VhxAyGjqokCzlR0Rd1:jaYYebuxGeorlR0x
Malware Config
Signatures
Files
-
11779d13928332d2cfdee74de22501abddbe5c8b6af3104a806a2d1dc15ba2bc.exe windows x86
caa5ef3b406972a4662fc33dc66f3cf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
unlha32
ord301
wininet
InternetOpenA
HttpSendRequestA
FtpGetFileA
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlA
HttpQueryInfoA
InternetCloseHandle
kernel32
CreateFileA
GetFileSize
GlobalLock
WriteFile
GlobalAlloc
SearchPathA
GetPrivateProfileStringA
WritePrivateProfileStringA
CloseHandle
GetModuleFileNameA
VirtualProtect
GetSystemTimeAsFileTime
GetCurrentProcessId
DeleteFileA
QueryPerformanceCounter
SetStdHandle
IsBadWritePtr
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
LoadLibraryA
GetOEMCP
GetACP
RtlUnwind
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FindNextFileA
FindClose
RemoveDirectoryA
FindFirstFileA
GetSystemInfo
GetTimeZoneInformation
VirtualQuery
LCMapStringA
LCMapStringW
HeapSize
FlushFileBuffers
GetLocaleInfoW
CompareStringA
CompareStringW
GetTickCount
TlsFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
SetEnvironmentVariableA
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
GetLastError
GetCurrentThread
TlsAlloc
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
HeapFree
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetCPInfo
FatalAppExitA
user32
MessageBeep
SetFocus
SendMessageA
BeginPaint
GetDlgItem
EndDialog
IsDlgButtonChecked
SetWindowTextA
EndPaint
GetDlgItemTextA
GetWindowRect
GetDesktopWindow
SetWindowPos
DialogBoxParamA
wsprintfA
MessageBoxA
LoadBitmapA
EnableWindow
gdi32
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
GetObjectA
BitBlt
advapi32
RegFlushKey
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ