Static task
static1
Behavioral task
behavioral1
Sample
94d5c069ec5046e74d899e7440c93270c141a26fe65dbeb614adc15608680ba0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94d5c069ec5046e74d899e7440c93270c141a26fe65dbeb614adc15608680ba0.exe
Resource
win10v2004-20220812-en
General
-
Target
94d5c069ec5046e74d899e7440c93270c141a26fe65dbeb614adc15608680ba0
-
Size
135KB
-
MD5
9168180aefb01ff47a140485bbf612e4
-
SHA1
c319225ed532763b15387e4bc8726147f04c6b76
-
SHA256
94d5c069ec5046e74d899e7440c93270c141a26fe65dbeb614adc15608680ba0
-
SHA512
c0ef82abc57eb741c29b828e7628e44bf64d8187469a2352da36f7b305fc6d7e3577b2e5dde706fed6813cb1b4496ced26e7b561b97329c4ea6c3b3a5c0b8c4d
-
SSDEEP
3072:gZ7axbvqX96vbBgqzhGLwBbZ1gOKlctaS:BRvWsgqzhnBb4dS
Malware Config
Signatures
Files
-
94d5c069ec5046e74d899e7440c93270c141a26fe65dbeb614adc15608680ba0.exe windows x86
10bc3c346e9fe97a92dc9120056dca04
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SearchPathA
GetShortPathNameA
DeleteFileA
GetModuleFileNameA
SystemTimeToFileTime
GetSystemTime
GetSystemInfo
GetVersionExW
GetSystemDirectoryW
GetShortPathNameW
ExitProcess
Sleep
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentThreadId
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
ReadFile
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
SetStdHandle
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetModuleHandleW
GetModuleFileNameW
GetTickCount
CreateFileW
WriteFile
CloseHandle
SizeofResource
FindResourceA
GetModuleHandleA
LoadLibraryExW
GetProcAddress
LockResource
LoadLibraryA
LoadResource
HeapSize
WinExec
QueryPerformanceCounter
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
RaiseException
SetLastError
HeapAlloc
GetLastError
HeapFree
RtlUnwind
ExitThread
ResumeThread
CreateThread
GetVersionExA
GetProcessHeap
GetStartupInfoW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
GetStdHandle
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
user32
UpdateWindow
CreateWindowExW
SetTimer
ShowWindow
RegisterHotKey
GetSystemMetrics
LoadCursorW
GetThreadDesktop
CreateDesktopW
SetThreadDesktop
SwitchDesktop
CloseDesktop
GetWindowTextW
GetWindowLongW
GetClientRect
RedrawWindow
DrawTextW
GetWindowRect
RegisterClassExW
GetMessageW
TranslateMessage
DispatchMessageW
UnregisterClassW
DefWindowProcW
KillTimer
BeginPaint
EndPaint
MessageBoxW
PostQuitMessage
GetDesktopWindow
CreateWindowExA
gdi32
CreateFontW
SetBkMode
SetTextColor
CreatePen
SelectObject
CreateSolidBrush
Rectangle
DeleteObject
SetDIBitsToDevice
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
wininet
InternetReadFile
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
HttpSendRequestW
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ