Static task
static1
Behavioral task
behavioral1
Sample
4f60e0c2fc72ccd0d3daec562d158884ef4110c215c873c440fc10f8d0593773.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f60e0c2fc72ccd0d3daec562d158884ef4110c215c873c440fc10f8d0593773.exe
Resource
win10v2004-20220901-en
General
-
Target
4f60e0c2fc72ccd0d3daec562d158884ef4110c215c873c440fc10f8d0593773
-
Size
363KB
-
MD5
54919e1bd37c6431b3b1b8b6d53aabfe
-
SHA1
c2327bab84fa0d55cc23ee5006c83f0a6dc53e4c
-
SHA256
4f60e0c2fc72ccd0d3daec562d158884ef4110c215c873c440fc10f8d0593773
-
SHA512
9b1d07e28cc63075748d42c2afdac6f55332d35dcd791c93ecfbe73d5868c3fbc84558f0778358e576babb955210b4fc79a263fa703009ed247391ccc3790722
-
SSDEEP
6144:5aPIWVeTdJKsLxgcSNDQL5Q9VuwLmh0kdH371oe:5uTs1gBpQL5kmh0671oe
Malware Config
Signatures
Files
-
4f60e0c2fc72ccd0d3daec562d158884ef4110c215c873c440fc10f8d0593773.exe windows x86
266bed6766ee2a20cf7c2dd0d6245d96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
CreateProcessW
ExitThread
WaitForSingleObject
GetLastError
ExitProcess
IsDebuggerPresent
GetVersionExW
GetVolumeInformationW
SetEndOfFile
HeapSize
WriteConsoleW
ReadConsoleW
GetProcAddress
FindFirstFileExW
FindClose
GetCommandLineW
GetCommandLineA
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetModuleHandleW
CreateProcessA
GetStartupInfoA
GetModuleFileNameW
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetModuleFileNameA
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetFileAttributesW
FindFirstFileW
FindNextFileW
SetFileAttributesW
GetLocalTime
CreateThread
WinExec
GetLogicalDrives
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
Sleep
GetFileAttributesExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
FreeLibrary
LoadLibraryExW
RaiseException
RtlUnwind
QueryPerformanceFrequency
MoveFileExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetACP
HeapAlloc
HeapReAlloc
HeapFree
GetFileType
GetExitCodeProcess
user32
GetSystemMetrics
LoadCursorW
RegisterClassExW
CreateWindowExW
ShowWindow
ScreenToClient
GetCursorPos
DrawTextA
MessageBoxW
DefWindowProcW
PostQuitMessage
DestroyWindow
SetTimer
KillTimer
InvalidateRect
EndPaint
DrawTextW
FillRect
BeginPaint
DispatchMessageW
TranslateMessage
GetMessageW
GetWindowLongW
SetWindowLongW
gdi32
LineTo
MoveToEx
CreatePen
SetBkMode
DeleteObject
TextOutA
TextOutW
SetTextColor
SetBkColor
SelectObject
CreateFontW
CreateSolidBrush
advapi32
SystemFunction036
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
GetUserNameW
wininet
InternetOpenUrlW
InternetReadFile
InternetOpenW
netapi32
NetUserGetInfo
Sections
.text Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ