Static task
static1
Behavioral task
behavioral1
Sample
7138cd509c6c098feaf4128f7ed5b74a74a646e45137c6550f1231dbdac22600.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7138cd509c6c098feaf4128f7ed5b74a74a646e45137c6550f1231dbdac22600.exe
Resource
win10v2004-20221111-en
General
-
Target
7138cd509c6c098feaf4128f7ed5b74a74a646e45137c6550f1231dbdac22600.exe
-
Size
368KB
-
MD5
dc4ae2105938cb68c5b6988465e13da1
-
SHA1
4bf9313e1b4f51df9b94cf73e36adb53f8c29ac0
-
SHA256
7138cd509c6c098feaf4128f7ed5b74a74a646e45137c6550f1231dbdac22600
-
SHA512
02ad76fcda95f5fc06bc8c5f0fa7e103379f7001e05f1bb23bfe1e67262bda8b045ae1f317569aa30a44566bf26bcb487ec9319f1a51fff79d57c40612b1bdf7
-
SSDEEP
6144:/aPIWVeTdJKsLxgcSNDQL5Q9VuwLmh0kdH371o0:/uTs1gBpQL5kmh0671o0
Malware Config
Signatures
Files
-
7138cd509c6c098feaf4128f7ed5b74a74a646e45137c6550f1231dbdac22600.exe.exe windows x86
266bed6766ee2a20cf7c2dd0d6245d96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
CreateProcessW
ExitThread
WaitForSingleObject
GetLastError
ExitProcess
IsDebuggerPresent
GetVersionExW
GetVolumeInformationW
SetEndOfFile
HeapSize
WriteConsoleW
ReadConsoleW
GetProcAddress
FindFirstFileExW
FindClose
GetCommandLineW
GetCommandLineA
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetModuleHandleW
CreateProcessA
GetStartupInfoA
GetModuleFileNameW
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetModuleFileNameA
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetFileAttributesW
FindFirstFileW
FindNextFileW
SetFileAttributesW
GetLocalTime
CreateThread
WinExec
GetLogicalDrives
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
Sleep
GetFileAttributesExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
FreeLibrary
LoadLibraryExW
RaiseException
RtlUnwind
QueryPerformanceFrequency
MoveFileExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetACP
HeapAlloc
HeapReAlloc
HeapFree
GetFileType
GetExitCodeProcess
user32
GetSystemMetrics
LoadCursorW
RegisterClassExW
CreateWindowExW
ShowWindow
ScreenToClient
GetCursorPos
DrawTextA
MessageBoxW
DefWindowProcW
PostQuitMessage
DestroyWindow
SetTimer
KillTimer
InvalidateRect
EndPaint
DrawTextW
FillRect
BeginPaint
DispatchMessageW
TranslateMessage
GetMessageW
GetWindowLongW
SetWindowLongW
gdi32
LineTo
MoveToEx
CreatePen
SetBkMode
DeleteObject
TextOutA
TextOutW
SetTextColor
SetBkColor
SelectObject
CreateFontW
CreateSolidBrush
advapi32
SystemFunction036
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
GetUserNameW
wininet
InternetOpenUrlW
InternetReadFile
InternetOpenW
netapi32
NetUserGetInfo
Sections
.text Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ