Static task
static1
Behavioral task
behavioral1
Sample
74eae1e083e204db593c76756f0851715b8e50f7060b39d8aa68b42a315de404.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
74eae1e083e204db593c76756f0851715b8e50f7060b39d8aa68b42a315de404.exe
Resource
win10v2004-20230220-en
General
-
Target
74eae1e083e204db593c76756f0851715b8e50f7060b39d8aa68b42a315de404
-
Size
158KB
-
MD5
90b5858ed4f8e9c3a5d55db609938514
-
SHA1
82d56bc1f9ccc47b4819890c17559dad786693dd
-
SHA256
74eae1e083e204db593c76756f0851715b8e50f7060b39d8aa68b42a315de404
-
SHA512
d5031047917ca54eff5c2006a4b5d1f35301c607516edaf26971116c4088c6fd65bd640eab884a9e9cd5e6dae5b6371c4b59d6b65054158c7ac1b5017dce61a0
-
SSDEEP
3072:I79HogzLgnThT5Px81H3ia7gIbVThr2h3RsOb1ZTFau4VvBvuVN3:I79HoCgnTFCXMcBhrA/pZolbuH
Malware Config
Signatures
Files
-
74eae1e083e204db593c76756f0851715b8e50f7060b39d8aa68b42a315de404.exe windows x86
14eeea00f811b54aceb3964ea40923fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
Sleep
GetTickCount
SystemTimeToTzSpecificLocalTime
FindResourceA
FreeResource
LoadResource
SizeofResource
LockResource
GetShortPathNameW
VirtualFree
GetProcAddress
VirtualAlloc
GetModuleHandleA
VirtualProtect
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
FileTimeToSystemTime
RaiseException
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
HeapSize
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
LCMapStringW
GetStringTypeW
SetStdHandle
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
CreateFileW
CloseHandle
FlushFileBuffers
FindFirstFileW
WideCharToMultiByte
IsProcessorFeaturePresent
MultiByteToWideChar
advapi32
CryptAcquireContextA
CryptGetKeyParam
CryptSetKeyParam
CryptReleaseContext
CryptImportKey
CryptDestroyKey
CryptDecrypt
StartServiceW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CreateServiceW
ControlService
DeleteService
QueryServiceStatusEx
ws2_32
WSAStartup
wininet
InternetGetConnectedState
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 357KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ