Static task
static1
Behavioral task
behavioral1
Sample
a98ae241f940c1f0e23f233682ac53175191d2937fa40494ac460c4ba920d78e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a98ae241f940c1f0e23f233682ac53175191d2937fa40494ac460c4ba920d78e.exe
Resource
win10v2004-20220901-en
General
-
Target
a98ae241f940c1f0e23f233682ac53175191d2937fa40494ac460c4ba920d78e
-
Size
648KB
-
MD5
65e76686cdafae1937d671616a8141d0
-
SHA1
1c1e9ae38cfbfa3c16d7ec8b6160b20b027de055
-
SHA256
a98ae241f940c1f0e23f233682ac53175191d2937fa40494ac460c4ba920d78e
-
SHA512
67a8afbd0e197f0876b4cd81f4a6501458b054fa9be49872cff7b3a4fa9c4731a4ae7a1b5922a494568dc8233fd6220c9cb98f78990971a76504377de02c9860
-
SSDEEP
12288:shTvF39EIv6qedUaf2vTHOvyZapUnhVvD5+M7qho7GAGAzZbxdlgI:6TvF3KIvpeBuvTHOvyZapUnhVbsM17Gz
Malware Config
Signatures
Files
-
a98ae241f940c1f0e23f233682ac53175191d2937fa40494ac460c4ba920d78e.exe windows x86
a5c4eeb4d7c1774900eaac2f2ef63f8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5594
ord6283
ord6282
ord5651
ord350
ord1832
ord3939
ord1105
ord2233
ord536
ord1200
ord5683
ord4189
ord398
ord700
ord356
ord2770
ord4160
ord924
ord2781
ord4058
ord823
ord3311
ord3178
ord3319
ord1980
ord668
ord4277
ord925
ord940
ord922
ord2919
ord4204
ord913
ord1158
ord2764
ord2763
ord4129
ord4278
ord5710
ord2614
ord663
ord348
ord2393
ord6877
ord941
ord939
ord537
ord860
ord535
ord6876
ord926
ord858
ord3439
ord3790
ord540
ord2818
ord800
ord2915
ord5572
ord6394
ord5450
ord6383
ord5440
ord521
ord6307
ord4167
ord803
ord825
ord543
ord3663
ord3584
ord1871
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
_CxxThrowException
_purecall
_mbscmp
strncpy
strtok
_mbsicmp
_mbsstr
atoi
strstr
__p__environ
_splitpath
_makepath
memmove
__CxxFrameHandler
_mbstok
_strcmpi
kernel32
FreeLibrary
GetVersionExA
LoadLibraryA
GetProcAddress
ReadFile
WriteFile
ExpandEnvironmentStringsA
GetFullPathNameA
CreatePipe
GetLastError
GetCurrentProcess
DuplicateHandle
CreateProcessA
LeaveCriticalSection
EnterCriticalSection
CloseHandle
WaitForMultipleObjects
WaitForSingleObject
ReleaseSemaphore
CreateSemaphoreA
DeleteCriticalSection
InitializeCriticalSection
GetTimeFormatA
DeleteFileA
GetFileSize
GetFileTime
CreateFileA
CreateIoCompletionPort
PostQueuedCompletionStatus
GetQueuedCompletionStatus
LocalFree
lstrcpynA
FormatMessageA
InterlockedExchange
GetModuleHandleA
ResumeThread
Sleep
GetTickCount
GetModuleFileNameA
ResetEvent
LockResource
LoadResource
SizeofResource
FindResourceA
SetLastError
GetStartupInfoA
GetSystemTime
GetFileAttributesA
SetEvent
SystemTimeToFileTime
FileTimeToSystemTime
GetDateFormatA
CompareFileTime
user32
CreateWindowExA
PostQuitMessage
EndPaint
DrawTextA
GetClientRect
BeginPaint
DestroyWindow
DefWindowProcA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
advapi32
RegCloseKey
RegOpenKeyExA
RevertToSelf
ImpersonateLoggedOnUser
LogonUserA
RegQueryValueExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ws2_32
gethostname
gethostbyaddr
WSAGetLastError
socket
gethostbyname
inet_addr
htons
send
recv
closesocket
select
listen
bind
htonl
accept
WSAStartup
WSACleanup
WSAEventSelect
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 568KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE