Static task
static1
Behavioral task
behavioral1
Sample
ec35c400c3ee7116d2fe74a8f1a881533d67ee36e59c4697be9ab217f8ee5b69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec35c400c3ee7116d2fe74a8f1a881533d67ee36e59c4697be9ab217f8ee5b69.exe
Resource
win10v2004-20220812-en
General
-
Target
ec35c400c3ee7116d2fe74a8f1a881533d67ee36e59c4697be9ab217f8ee5b69
-
Size
133KB
-
MD5
709b0fb224547e5a930a846f503425aa
-
SHA1
cb5687fcc1d8f013c22d077b31be5d63466b95e8
-
SHA256
ec35c400c3ee7116d2fe74a8f1a881533d67ee36e59c4697be9ab217f8ee5b69
-
SHA512
4e68883a5564f5eff2a367133f552f7ca18f6fb38cf806c608a26ec9c65f2a1c62f9a61fbe36927da81d3c9f70374a0d4424f41774a28ff34fbd90f018e48dac
-
SSDEEP
3072:cAvlMaRiX1WIblLBZxXwz+DXO0B5+JQ28mjwq:cOKaRiFFPgkSJQ2HEq
Malware Config
Signatures
Files
-
ec35c400c3ee7116d2fe74a8f1a881533d67ee36e59c4697be9ab217f8ee5b69.exe windows x86
80968cb06af3199d4bfd82c752b703c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
recv
send
accept
htonl
htons
WSAEventSelect
select
getsockname
connect
listen
bind
socket
WSASetEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSACreateEvent
WSAGetLastError
closesocket
WSACloseEvent
WSACleanup
WSAStartup
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegOpenKeyExA
msvcr71
??0exception@@QAE@ABV0@@Z
_except_handler3
_snprintf
exit
_strnicmp
??0exception@@QAE@XZ
strerror
_errno
fopen
fclose
setlocale
_iob
strftime
localtime
time
fprintf
fflush
memchr
tolower
fgets
malloc
_callnewh
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
??1type_info@@UAE@XZ
__security_error_handler
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
??1exception@@UAE@XZ
_CxxThrowException
__CxxFrameHandler
??3@YAXPAX@Z
memmove
_vsnprintf
kernel32
GetLongPathNameA
GetModuleFileNameA
GetThreadLocale
GetFullPathNameA
SetErrorMode
GetVersionExA
GetSystemInfo
QueryDosDeviceA
GetLogicalDrives
CreateFileA
WideCharToMultiByte
GetCurrentThread
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
CloseHandle
GetCurrentProcess
GetProcAddress
FreeLibrary
GetSystemDirectoryA
LoadLibraryA
GetLastError
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE