Static task
static1
Behavioral task
behavioral1
Sample
0c60d439476bff8200c59bdfff6a7e54c6c08964474e721cb92f1823fc489dbc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c60d439476bff8200c59bdfff6a7e54c6c08964474e721cb92f1823fc489dbc.exe
Resource
win10v2004-20220812-en
General
-
Target
0c60d439476bff8200c59bdfff6a7e54c6c08964474e721cb92f1823fc489dbc
-
Size
168KB
-
MD5
659e354b9282e303e8d392b9c429fb7c
-
SHA1
d30a42b6a0cbcd87e274acc587d8313c5e740279
-
SHA256
0c60d439476bff8200c59bdfff6a7e54c6c08964474e721cb92f1823fc489dbc
-
SHA512
cb8dcb6e4334b24a86bd85847ba02c8733400807c7f2f60d89348f4ad0d91d6c606a674251179cfd560819cf0912b1e38ae7965731a85632bc88611a7ac21086
-
SSDEEP
3072:yQeOfjR2cVCxk+WI0opiKyD/IOSfS0G1aq/tmxmAPxJFrTgIR5+m3/s:7eON2cVCxk7ooBo1e1wmAp
Malware Config
Signatures
Files
-
0c60d439476bff8200c59bdfff6a7e54c6c08964474e721cb92f1823fc489dbc.exe windows x86
285d430084961aaa803062c216828f82
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
connect
WSACleanup
WSACloseEvent
recv
send
accept
htonl
htons
WSAEventSelect
select
getsockname
WSAStartup
listen
bind
socket
WSASetEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSACreateEvent
WSAGetLastError
closesocket
ole32
OleInitialize
OleUninitialize
advapi32
EqualSid
CreateServiceA
DeleteService
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
QueryServiceStatus
StartServiceA
ControlService
CloseServiceHandle
RegDeleteValueA
SetServiceStatus
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenThreadToken
OpenProcessToken
GetTokenInformation
FreeSid
AllocateAndInitializeSid
msvcr71
isxdigit
iswctype
fread
sscanf
_strnicmp
_purecall
isdigit
strtod
isspace
getenv
_iob
_vsnprintf
setlocale
strftime
localtime
time
abort
_endthreadex
_beginthreadex
tolower
fgets
??1type_info@@UAE@XZ
__dllonexit
_onexit
__security_error_handler
_c_exit
_exit
_XcptFilter
_cexit
__p___initenv
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
_except_handler3
strcspn
sprintf
fclose
printf
_strtoui64
_strtoi64
strtol
??_U@YAPAXI@Z
localeconv
strtoul
fopen
_errno
strerror
??0bad_cast@@QAE@PBD@Z
??1bad_cast@@UAE@XZ
??0bad_cast@@QAE@ABV0@@Z
fprintf
free
??_V@YAXPAX@Z
memchr
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
_stat
memcpy
__crtLCMapStringA
__pctype_func
isupper
___lc_codepage_func
___lc_handle_func
_unlock
malloc
_lock
___setlc_active_func
___unguarded_readlc_active_add_func
islower
__uncaught_exception
exit
fflush
kernel32
GetTickCount
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
GlobalMemoryStatus
WaitForMultipleObjects
DeviceIoControl
UnmapViewOfFile
VirtualUnlock
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
VirtualLock
LoadLibraryExA
MapViewOfFile
CreateFileMappingA
Sleep
GetSystemTimeAsFileTime
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleHandleA
SetConsoleCtrlHandler
GetCurrentProcessId
OpenProcess
SetPriorityClass
CreateEventA
SetEvent
WaitForSingleObject
GetCurrentThread
WideCharToMultiByte
CreateFileA
GetLogicalDrives
QueryDosDeviceA
GetFullPathNameA
GetLongPathNameA
GetModuleFileNameA
GetThreadLocale
CloseHandle
SetErrorMode
GetVersionExA
GetSystemInfo
LoadLibraryA
GetLastError
GetCurrentProcess
GetProcAddress
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ