Static task
static1
Behavioral task
behavioral1
Sample
85fe45ceadc4d0e1b8e3b9b1588505d08e6b8ffa7c5397394f93314f5b89492e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
85fe45ceadc4d0e1b8e3b9b1588505d08e6b8ffa7c5397394f93314f5b89492e.exe
Resource
win10v2004-20230220-en
General
-
Target
85fe45ceadc4d0e1b8e3b9b1588505d08e6b8ffa7c5397394f93314f5b89492e
-
Size
2.0MB
-
MD5
ad7d7b6f264de68b5db957718eef81dd
-
SHA1
1fda18740eed7f814de70928e9a419baea1d8cb8
-
SHA256
85fe45ceadc4d0e1b8e3b9b1588505d08e6b8ffa7c5397394f93314f5b89492e
-
SHA512
6e7365e068b72331b1c6093eaf85762365a9be0b429f64907ec1e6c7947ca430a01663948630d40cd1f814eb84c45e9385bfbc43459fe7663d64e86f290daefb
-
SSDEEP
49152:IL3HMVNeI0Ey+xYoyyw89+KPnLICIFsCtHoTw:IL3HyNeCy+xYoyyw8ncaCaTw
Malware Config
Signatures
Files
-
85fe45ceadc4d0e1b8e3b9b1588505d08e6b8ffa7c5397394f93314f5b89492e.exe windows x86
fca77154e57c62dfd349b6a1804e06ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
URLDownloadToCacheFileA
wininet
InternetSetOptionA
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
shell32
SHGetMalloc
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
Shell_NotifyIconA
SHGetDesktopFolder
kernel32
WriteFile
GetLocalTime
SetFilePointer
CreateFileA
CloseHandle
GetModuleFileNameA
GetTempPathA
lstrlenA
LoadLibraryA
GlobalAddAtomA
WaitForSingleObject
ExpandEnvironmentStringsA
LoadLibraryExA
GetPrivateProfileStringA
GetSystemDirectoryA
GlobalFindAtomA
TerminateThread
CreateThread
GetDriveTypeA
GetLogicalDrives
CopyFileA
DeleteFileA
SetLastError
FindClose
RaiseException
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcmpiA
IsDBCSLeadByte
GetModuleHandleA
ReleaseMutex
SetPriorityClass
GetCurrentProcess
CreateMutexA
SetThreadLocale
GetThreadLocale
GetACP
SetErrorMode
InterlockedExchange
GetVersion
CompareStringA
RemoveDirectoryA
WaitForMultipleObjects
GetDiskFreeSpaceExA
ReadFile
GetConsoleMode
GetStdHandle
WriteConsoleA
GetFileAttributesA
GetTempFileNameA
OutputDebugStringA
GetFileSize
FindNextFileA
SetFileAttributesA
FindFirstFileA
GetWindowsDirectoryA
GetVersionExA
HeapFree
HeapAlloc
GetProcessHeap
FormatMessageA
VerifyVersionInfoA
VerSetConditionMask
lstrcpyA
OpenProcess
GetExitCodeProcess
TerminateProcess
CreateProcessA
GetShortPathNameA
GetPrivateProfileIntA
WritePrivateProfileStringA
DeviceIoControl
GetFullPathNameA
GetSystemDefaultLangID
GetSystemTime
MoveFileA
SetEnvironmentVariableA
GetVolumeInformationA
DeleteAtom
AddAtomA
SystemTimeToFileTime
MoveFileExA
GlobalAlloc
GlobalFree
lstrcmpA
LocalFileTimeToFileTime
IsBadReadPtr
GetCurrentDirectoryA
DuplicateHandle
SetFileTime
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
FlushFileBuffers
WaitNamedPipeA
GetSystemWindowsDirectoryA
GetTickCount
FileTimeToSystemTime
CreateDirectoryA
SystemTimeToTzSpecificLocalTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
GetStartupInfoA
GetCommandLineA
SetEndOfFile
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetCurrentThreadId
ExitThread
RtlUnwind
HeapSize
HeapReAlloc
HeapDestroy
GetLocaleInfoA
GetUserDefaultLangID
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
Sleep
GetLastError
FreeLibrary
GetCurrentProcessId
LCMapStringA
HeapCreate
VirtualFree
ExitProcess
SetStdHandle
GetFileType
SetHandleCount
GetConsoleCP
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
QueryPerformanceCounter
GetStringTypeA
GetConsoleOutputCP
LocalFree
GetFileTime
user32
GetSystemMenu
UnregisterClassA
PostMessageA
GetWindow
ExitWindowsEx
EnumChildWindows
wsprintfA
CharNextA
MessageBeep
CreateWindowExA
ClientToScreen
GetSystemMetrics
LoadImageA
SendMessageA
PostQuitMessage
GetWindowRect
MoveWindow
MessageBoxA
RemoveMenu
DrawMenuBar
DestroyWindow
IsWindow
ShowWindow
LoadIconA
advapi32
LookupPrivilegeValueA
SetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
AdjustTokenPrivileges
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AllocateAndInitializeSid
SetEntriesInAclA
FreeSid
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CreateProcessAsUserW
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoTaskMemRealloc
CLSIDFromProgID
StringFromGUID2
CoInitializeEx
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoInitialize
OleRun
CoTaskMemFree
oleaut32
GetErrorInfo
VariantInit
SysAllocString
SysFreeString
VarUI4FromStr
shlwapi
StrToIntA
PathFileExistsW
PathFileExistsA
PathAppendA
PathRemoveFileSpecA
SHDeleteKeyA
comctl32
InitCommonControlsEx
_TrackMouseEvent
netapi32
Netbios
Sections
.text Size: 380KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 220KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ