Static task
static1
Behavioral task
behavioral1
Sample
20790bcc2d23c994ffe63d1459aad31fb120511d2407a51dbe91074b502c2ffa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20790bcc2d23c994ffe63d1459aad31fb120511d2407a51dbe91074b502c2ffa.exe
Resource
win10v2004-20220812-en
General
-
Target
20790bcc2d23c994ffe63d1459aad31fb120511d2407a51dbe91074b502c2ffa
-
Size
63KB
-
MD5
5f5f21914cdbaf00bd6976be758ab65a
-
SHA1
9f4eb2d74875c54c0064e18d55e48a3635bc6af7
-
SHA256
20790bcc2d23c994ffe63d1459aad31fb120511d2407a51dbe91074b502c2ffa
-
SHA512
6bb04f2c46e1a7035184c44cccaec4cfa87d373450c5295bf864e50f59220ce66755ff6efd834c755f022ac56111963402956e7f74c6a4bcf66d842313e9257e
-
SSDEEP
1536:hZRzyAqWS8vEi8jMSRrPCh4YWDQ3tnwesODpy:hZq83VyUtnwdODp
Malware Config
Signatures
Files
-
20790bcc2d23c994ffe63d1459aad31fb120511d2407a51dbe91074b502c2ffa.exe windows x86
a7d7695539886d1caed494886bc4a7ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GetFileSize
ReadProcessMemory
GetVersion
GetCommandLineA
GetLastError
OpenProcess
GetProcAddress
LoadLibraryA
GetCurrentProcess
FindNextFileA
FindFirstFileA
WinExec
TerminateProcess
Sleep
GetSystemDirectoryA
GetCurrentProcessId
GetPrivateProfileIntA
lstrcmpiA
MultiByteToWideChar
SetThreadPriority
GetCurrentThread
ReadFile
GetLocalTime
DeleteFileA
GetTempPathA
CreateProcessW
GetStartupInfoW
GetPrivateProfileIntW
GetPrivateProfileStringW
lstrcatW
OutputDebugStringA
CreateThread
QueryDosDeviceA
GetLogicalDriveStringsA
GetShortPathNameA
Module32First
TerminateThread
lstrlenA
GetModuleHandleA
WriteFile
GlobalFree
GetComputerNameA
GetVersionExA
CloseHandle
LocalFree
WideCharToMultiByte
CreateFileA
GetVolumeInformationA
user32
IsWindow
SendMessageA
ShowCursor
wsprintfA
MessageBoxA
GetWindowTextA
GetDesktopWindow
GetWindow
PostMessageA
FindWindowExA
FindWindowA
msvcrt
malloc
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
_except_handler3
_rotl
strstr
strtok
memcmp
strrchr
strchr
printf
strcmp
__mb_cur_max
rename
_mbscmp
__dllonexit
_onexit
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
mbstowcs
free
strcat
_snprintf
fopen
fread
fclose
_mbsstr
_mbslwr
_mbsnbcpy
memset
_strcmpi
strlen
sprintf
tolower
_wcsupr
wcslen
_CxxThrowException
??1type_info@@UAE@XZ
strcpy
mfc42
ord815
ord2915
ord800
ord537
ord2107
ord2044
ord2448
ord2841
ord6394
ord5834
ord5450
ord540
ord858
ord3663
ord1575
ord561
advapi32
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetNamedSecurityInfoA
shell32
SHGetSpecialFolderPathW
SHChangeNotify
SHFileOperationA
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
OleRun
oleaut32
VariantInit
VariantCopy
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
msvcp60
??0_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
psapi
GetProcessImageFileNameA
EnumProcesses
shlwapi
SHGetValueA
PathRemoveFileSpecA
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ