Static task
static1
Behavioral task
behavioral1
Sample
dba1a67a7d7073c604a817d11160fdf660714f556310534ae10fd14894a29ba8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dba1a67a7d7073c604a817d11160fdf660714f556310534ae10fd14894a29ba8.exe
Resource
win10v2004-20220812-en
General
-
Target
dba1a67a7d7073c604a817d11160fdf660714f556310534ae10fd14894a29ba8
-
Size
80KB
-
MD5
6c0f7638e1b7c2b102742e3e7741eb0b
-
SHA1
d60ff5dc8f4c32a2cd180db2be09ec6bab587ca4
-
SHA256
dba1a67a7d7073c604a817d11160fdf660714f556310534ae10fd14894a29ba8
-
SHA512
8b9426237704ea9d7c570170a455e9e3d1507ed3120dc1d69671b1875e8c8b932a34c95fa15abffd3b8e398313ae10598bc917eb392c2cf8de95f39ff034016e
-
SSDEEP
1536:9Y9vZ7n8AJK0PtjtnJWov85XQv7Mj06nBadKjeMTyceE:+vZLkYJWoouMoOBUo2c
Malware Config
Signatures
Files
-
dba1a67a7d7073c604a817d11160fdf660714f556310534ae10fd14894a29ba8.exe windows x86
ccdf6a773946093094048e981772e28f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetExitCodeProcess
GetFileSize
SetFilePointer
ReadFile
FindClose
FindNextFileA
FindFirstFileA
GetVersionExA
GlobalMemoryStatus
DeleteFileA
GetSystemDirectoryA
Beep
GetLogicalDriveStringsA
CreateThread
CreateProcessA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
OpenProcess
GetModuleHandleA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WaitForSingleObject
GetLogicalDrives
GetDriveTypeA
GetVolumeInformationA
CreateFileA
WriteFile
CloseHandle
GetVersion
GetCurrentProcess
WinExec
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
GetWindowsDirectoryA
Sleep
SetFileAttributesA
CopyFileA
GetLocalTime
MultiByteToWideChar
SetStdHandle
LoadLibraryA
GetProcAddress
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
FlushFileBuffers
user32
PostThreadMessageA
ExitWindowsEx
MessageBoxA
advapi32
ControlService
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
ChangeServiceConfig2A
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
SetServiceStatus
StartServiceCtrlDispatcherA
ws2_32
gethostname
recv
send
gethostbyname
WSACleanup
htons
bind
listen
accept
closesocket
setsockopt
socket
WSASocketA
WSAStartup
connect
shlwapi
PathFileExistsA
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ