Static task
static1
Behavioral task
behavioral1
Sample
9a2dc4d400aa48ca1ade1ee8659ad03b2755a45606bcdd2d94c8856f282f1a65.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9a2dc4d400aa48ca1ade1ee8659ad03b2755a45606bcdd2d94c8856f282f1a65.exe
Resource
win10v2004-20220812-en
General
-
Target
9a2dc4d400aa48ca1ade1ee8659ad03b2755a45606bcdd2d94c8856f282f1a65
-
Size
83KB
-
MD5
239175534feb45987841981ac90b7104
-
SHA1
3949859bef080730cf04fa18b0e2508661d92796
-
SHA256
9a2dc4d400aa48ca1ade1ee8659ad03b2755a45606bcdd2d94c8856f282f1a65
-
SHA512
a1d5cbba36032f5ee03ed883fb61a3f1cddd933dac96dd889550c95e321169331ead1e3840598b852ad3635f4be35ada93e394b7ccec890904cfc61ec225f0f1
-
SSDEEP
1536:mtcAq1vpN8BrQ4t9LrgA742XtHP+9U2JqwbYJltvuo:yc23jLoktvj2JqwbYJlt2o
Malware Config
Signatures
Files
-
9a2dc4d400aa48ca1ade1ee8659ad03b2755a45606bcdd2d94c8856f282f1a65.exe windows x86
a88d2dcd95d9c2dd51d361a8c66e79dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ntohl
htonl
bind
closesocket
getsockname
gethostbyname
WSAStartup
setsockopt
send
listen
accept
WSACleanup
inet_addr
shutdown
recv
inet_ntoa
socket
htons
ioctlsocket
connect
select
shell32
SHGetFolderPathA
advapi32
GetUserNameA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
wininet
InternetOpenUrlA
InternetReadFile
InternetOpenA
kernel32
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetEndOfFile
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalFree
RaiseException
IsBadReadPtr
TerminateThread
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
GlobalUnlock
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
InterlockedDecrement
GetTickCount
Sleep
CopyFileA
GetProcAddress
LoadLibraryA
MultiByteToWideChar
SetFileTime
CloseHandle
GetFileTime
CreateFileA
SetFileAttributesA
ExitThread
GetSystemDirectoryA
CreateDirectoryA
GetModuleFileNameA
GlobalFree
UnmapViewOfFile
lstrlenA
MapViewOfFile
CreateFileMappingA
SetFilePointer
WriteFile
GetFileSize
FindClose
FindNextFileA
lstrcatA
GetFullPathNameA
SetCurrentDirectoryA
FindFirstFileA
GetDriveTypeA
LeaveCriticalSection
EnterCriticalSection
CreateThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
ExitProcess
CreateProcessA
WaitForSingleObject
CreateMutexA
SetErrorMode
GetTempPathA
GetLastError
GetVersionExA
HeapSize
ExpandEnvironmentStringsA
GetFileAttributesA
GetModuleHandleA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetCurrentProcess
TerminateProcess
ReadFile
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetVersion
GetCommandLineA
GetStartupInfoA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapFree
HeapAlloc
RtlUnwind
user32
SetClipboardData
CloseClipboard
EmptyClipboard
OpenClipboard
VkKeyScanA
keybd_event
FindWindowA
GetWindowThreadProcessId
CharLowerA
BlockInput
SetForegroundWindow
SetFocus
ShowWindow
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
VariantClear
GetErrorInfo
VariantInit
SysFreeString
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE