Static task
static1
Behavioral task
behavioral1
Sample
739c07c70769be92deb8f7967cc424a145d1210b154b69d2c216bf65597127d6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
739c07c70769be92deb8f7967cc424a145d1210b154b69d2c216bf65597127d6.exe
Resource
win10v2004-20230220-en
General
-
Target
739c07c70769be92deb8f7967cc424a145d1210b154b69d2c216bf65597127d6
-
Size
302KB
-
MD5
5b38cba38c38f3cc8ad557565a7ddc78
-
SHA1
26ff375701f51aa91145ba66915e4aae75bbb77d
-
SHA256
739c07c70769be92deb8f7967cc424a145d1210b154b69d2c216bf65597127d6
-
SHA512
370be9b4bffd2a179b5584123faa16fa6bc01715941b25008def186503f2fe89c47a33a9ea3a39fcfb80295784f1af30d193db49a911ff623166d5b254a0a32e
-
SSDEEP
6144:nCchgmvZFIubQxMzVLH0AOZcuXHCXlD3MHZ6NjF/f:nCchgmxFIWLH0ntuNNJf
Malware Config
Signatures
Files
-
739c07c70769be92deb8f7967cc424a145d1210b154b69d2c216bf65597127d6.exe windows x86
a1914c74df2b6b135a6fc5a1b6bfa0d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
InitializeCriticalSectionEx
HeapSize
Sleep
GetLastError
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
CreateProcessA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
EncodePointer
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetEndOfFile
WriteConsoleW
CreateFileW
ReadConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetFilePointerEx
ReadFile
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LocalFree
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetACP
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DeleteFileW
user32
MessageBoxA
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoUninitialize
oleaut32
SysFreeString
SysAllocString
VariantClear
urlmon
URLDownloadToFileA
Sections
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 780B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ