Static task
static1
Behavioral task
behavioral1
Sample
a83cdbac502bc7b06e9457078a6021fcbcaac72ac47d592171bde4791ac149a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a83cdbac502bc7b06e9457078a6021fcbcaac72ac47d592171bde4791ac149a0.exe
Resource
win10v2004-20220812-en
General
-
Target
a83cdbac502bc7b06e9457078a6021fcbcaac72ac47d592171bde4791ac149a0
-
Size
154KB
-
MD5
7e3d9d7867b81e56d8cbd3aa0d2db7a9
-
SHA1
5af18a7e010da16f1198d0de50486e1534924237
-
SHA256
a83cdbac502bc7b06e9457078a6021fcbcaac72ac47d592171bde4791ac149a0
-
SHA512
7f588457ff8da97bd00e0d247e7198ba7660cafa521a6cdc74084ae59914fc539637279755b4dbaba5c26d640a1bc98f9bc87529b27929a918c89963488260cb
-
SSDEEP
3072:WMDeJAvktXW7ODakUJGmSd0pUa8s4OduZLA7VqZIerAal0:W8eJkktXWpkUgmg2H8sDduxkkZuq
Malware Config
Signatures
Files
-
a83cdbac502bc7b06e9457078a6021fcbcaac72ac47d592171bde4791ac149a0.exe windows x86
d63325669043f94b51596e2a421455ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenEventA
WaitForMultipleObjects
ReleaseMutex
CloseHandle
GetCommandLineW
GetCurrentProcess
OutputDebugStringW
OpenProcess
WideCharToMultiByte
GetVersionExW
CreateProcessA
TerminateProcess
MultiByteToWideChar
SetLastError
GetProcAddress
Process32FirstW
Process32NextW
GetModuleHandleA
CreateToolhelp32Snapshot
FindResourceW
MoveFileA
SizeofResource
LockResource
DeleteFileA
CreateFileW
GetTimeZoneInformation
FlushFileBuffers
SetStdHandle
WriteConsoleW
LoadLibraryW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetLastError
CreateEventA
Sleep
WriteFile
SetEvent
WaitForSingleObject
SetFilePointerEx
SetEndOfFile
SetFilePointer
CreateMutexW
LoadResource
CreateFileA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetConsoleMode
GetConsoleCP
GetModuleFileNameW
GetStdHandle
HeapCreate
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
ExitProcess
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
CompareStringW
LCMapStringW
RtlUnwind
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
FindClose
FindNextFileA
FindFirstFileExA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemTimeAsFileTime
CreateThread
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
ExitThread
GetCurrentThreadId
user32
keybd_event
CreateDesktopA
FindWindowExA
SendMessageA
GetWindowTextA
OpenDesktopA
SetThreadDesktop
PostMessageA
GetWindowRect
MapVirtualKeyW
IsWindowVisible
VkKeyScanW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathA
CommandLineToArgvW
ole32
CoInitializeEx
CoCreateInstance
oleaut32
SysStringLen
SysAllocString
shlwapi
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
StrCpyW
PathAppendA
PathFileExistsA
urlmon
URLDownloadToFileA
winhttp
WinHttpReceiveResponse
WinHttpSetTimeouts
WinHttpSendRequest
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpOpenRequest
WinHttpReadData
WinHttpAddRequestHeaders
WinHttpCloseHandle
wininet
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
HttpQueryInfoW
HttpAddRequestHeadersW
InternetReadFile
InternetOpenW
InternetCrackUrlA
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ