Static task
static1
Behavioral task
behavioral1
Sample
f2a5b5965bb39e52059791bcd896be531973d0dfa4f32709bcb1d166c971054d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f2a5b5965bb39e52059791bcd896be531973d0dfa4f32709bcb1d166c971054d.exe
Resource
win10v2004-20230220-en
General
-
Target
f2a5b5965bb39e52059791bcd896be531973d0dfa4f32709bcb1d166c971054d
-
Size
148KB
-
MD5
d8dca37bfe205585ed89511c014852ed
-
SHA1
7cd2e0fcb9fa5b0bc1d2e5b53344c535225861b0
-
SHA256
f2a5b5965bb39e52059791bcd896be531973d0dfa4f32709bcb1d166c971054d
-
SHA512
1d2305244c9e061b6a1a41fccd28e9336af47ca4569d99e3c036f638e6a2eb3c561ccb8ad25b1d5b34c7bcfb2d070cd57b0e71d3d4e780d725ef11cfbb3a111f
-
SSDEEP
3072:AI8pJZufqzKWVrsXFhwAC6+xxQ89QoD5ZMyvEiff:AI8pkBWVEQA1+KyZD5iycOf
Malware Config
Signatures
Files
-
f2a5b5965bb39e52059791bcd896be531973d0dfa4f32709bcb1d166c971054d.exe windows x86
c443e15ff7c96ead682292e6656c639a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadReadPtr
SetLastError
GetProcAddress
LoadLibraryA
VirtualProtect
lstrcmpiA
GetCurrentThreadId
ExitProcess
CreateFileA
SetPriorityClass
InterlockedDecrement
Process32First
GetTickCount
GetCurrentThread
WriteFile
GetDriveTypeA
OpenProcess
GlobalAlloc
WideCharToMultiByte
GetFileAttributesA
TerminateProcess
FileTimeToSystemTime
lstrcatA
GetEnvironmentVariableA
MultiByteToWideChar
SetThreadPriority
GetShortPathNameA
GlobalFree
Process32Next
GlobalMemoryStatusEx
GetModuleHandleA
CreateToolhelp32Snapshot
GetFileTime
GetDiskFreeSpaceExA
GetVersionExA
DeleteFileA
lstrcpyA
SetErrorMode
SetUnhandledExceptionFilter
CreateMutexA
GetProcessHeap
SetEnvironmentVariableA
CompareStringW
GetStringTypeW
HeapFree
HeapAlloc
FreeLibrary
lstrlenA
GetNativeSystemInfo
GetCurrentProcessId
CancelIo
GetModuleFileNameA
GetSystemInfo
ResetEvent
GetCurrentProcess
InterlockedExchange
TerminateThread
CloseHandle
GetLastError
CreateEventA
Sleep
SetEvent
WaitForSingleObject
VirtualAlloc
LCMapStringW
HeapSize
VirtualQuery
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
GetModuleFileNameW
GetStdHandle
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
HeapSetInformation
GetCommandLineA
LocalFree
VirtualFree
GetModuleHandleW
DecodePointer
GetSystemTimeAsFileTime
HeapReAlloc
ExitThread
CreateThread
user32
GetLastInputInfo
ExitWindowsEx
wsprintfA
advapi32
RegEnumValueA
CloseEventLog
RegCloseKey
AdjustTokenPrivileges
OpenEventLogA
RegOpenKeyA
CheckTokenMembership
ClearEventLogA
FreeSid
OpenProcessToken
AllocateAndInitializeSid
RegQueryInfoKeyA
RegOpenKeyExA
LookupPrivilegeValueA
LookupAccountSidA
RegQueryValueExA
RegSetValueExA
GetTokenInformation
shell32
ShellExecuteExA
ole32
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
ws2_32
send
gethostbyname
closesocket
socket
recv
setsockopt
htons
select
WSAStartup
connect
WSAIoctl
getsockname
gethostname
WSACleanup
psapi
GetModuleFileNameExA
avicap32
capGetDriverDescriptionA
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ