Static task
static1
Behavioral task
behavioral1
Sample
a4fb35a2b960620d1c1824ceeef158ac42fdd348f2a9ddc9ed5c800e3006f2dd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4fb35a2b960620d1c1824ceeef158ac42fdd348f2a9ddc9ed5c800e3006f2dd.exe
Resource
win10v2004-20221111-en
General
-
Target
a4fb35a2b960620d1c1824ceeef158ac42fdd348f2a9ddc9ed5c800e3006f2dd
-
Size
131KB
-
MD5
2e60149d27247f70b19c1377adf4d9b3
-
SHA1
f83f397bbeb65e106e2e40bd08b00bc63f50f5e4
-
SHA256
a4fb35a2b960620d1c1824ceeef158ac42fdd348f2a9ddc9ed5c800e3006f2dd
-
SHA512
7da275b9c1ff463bdb0cf1bf226f6b305ba3ad8b9c5b7262141571c4a3486425f951b9f0cd6706e2e024a04e98c8748ff6cc5b5d834e7eb8b69558198f412c49
-
SSDEEP
1536:GBCWWPEisNtCr5BWA0MIAkUjGSu0J2K1nNzJ7TpkUeNnFsjNzuzvxUrtkp+H:GBMPdr5h0TMJR/nNRsIpizvxQtkp+
Malware Config
Signatures
Files
-
a4fb35a2b960620d1c1824ceeef158ac42fdd348f2a9ddc9ed5c800e3006f2dd.exe windows x86
8e51070b4c4719ca839458c58d84073a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
GetProcAddress
GetModuleHandleW
CloseHandle
MultiByteToWideChar
WaitForSingleObject
GetModuleFileNameW
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
lstrcmpiW
Sleep
CreateThread
CreateEventW
GetCurrentThreadId
FreeLibrary
LoadLibraryExW
GetCommandLineW
HeapFree
HeapAlloc
HeapDestroy
LeaveCriticalSection
WriteConsoleW
LoadLibraryW
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
GetCurrentProcessId
GetLastError
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedDecrement
lstrlenW
WideCharToMultiByte
SetEvent
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
WriteFile
ExitProcess
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
EnterCriticalSection
IsProcessorFeaturePresent
GetFileType
GetStdHandle
SetHandleCount
GetCurrentProcess
TerminateProcess
HeapSize
GetProcessHeap
LocalFree
GetSystemTimeAsFileTime
RtlUnwind
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapReAlloc
user32
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
CharNextW
CharUpperW
advapi32
RegCloseKey
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
RegQueryInfoKeyW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ole32
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterClassObject
CoAddRefServerProcess
CoReleaseServerProcess
CoInitializeEx
CoTaskMemRealloc
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
VariantClear
SysFreeString
SysAllocString
shlwapi
UrlUnescapeW
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ