Static task
static1
Behavioral task
behavioral1
Sample
8d5f9b51511963e1731172c440baa40cc8fca0ad5505587d8455559030ea3d52.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d5f9b51511963e1731172c440baa40cc8fca0ad5505587d8455559030ea3d52.exe
Resource
win10v2004-20220812-en
General
-
Target
8d5f9b51511963e1731172c440baa40cc8fca0ad5505587d8455559030ea3d52
-
Size
328KB
-
MD5
6e363d78061a15a645d84223d30ed280
-
SHA1
c5a8757f98b15ca447de3e6f6b09682bfd70e51f
-
SHA256
8d5f9b51511963e1731172c440baa40cc8fca0ad5505587d8455559030ea3d52
-
SHA512
f58afffcc922a047cfb6862e0177c6f5e2a979e8fbe1b7eb8ceeb3e5ebf15ba1b91095b65d2df85017dd3a961136bddf2f6369904c8f7cbab0c0254c963e5a17
-
SSDEEP
6144:kig6vnUlmf8X/T+M85bTDRGnxpWNIH8mytC0yj0Ilk3v9KP3fynPLnXuOnk9u2wq:kig6vUQ8X/T2DRGnxoNIcmys0DIu3vsR
Malware Config
Signatures
Files
-
8d5f9b51511963e1731172c440baa40cc8fca0ad5505587d8455559030ea3d52.exe windows x86
cfb7479fe6633715c517d11f0ae26fcf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcslen
wcstombs
atoi
wcscpy
_strupr
_beginthreadex
memcpy
calloc
_CIacos
printf
_CIpow
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
mbstowcs
_controlfp
vsprintf
exit
fopen
fwrite
fclose
strrchr
_except_handler3
free
strcmp
strcpy
malloc
memcmp
memset
strlen
_ftol
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
??1type_info@@UAE@XZ
_CxxThrowException
_access
rand
strncat
_chkesp
strcat
kernel32
GetModuleHandleA
WideCharToMultiByte
GetStartupInfoA
LocalFree
GetExitCodeThread
TerminateThread
CreateThread
lstrlenA
MultiByteToWideChar
GetLastError
InterlockedDecrement
SetEvent
WaitForSingleObject
LoadLibraryA
GetProcAddress
CloseHandle
Sleep
CreateEventA
user32
IsWindow
SendMessageA
CreateWindowExA
PostThreadMessageA
GetMessageA
ws2_32
WSAStartup
setsockopt
connect
getsockname
gethostname
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
WSACleanup
msvcp60
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ole32
OleRun
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
msvfw32
ICSendMessage
winmm
waveInPrepareHeader
waveInUnprepareHeader
waveInClose
waveOutPrepareHeader
waveOutWrite
waveInOpen
waveInReset
waveInStart
waveOutUnprepareHeader
waveOutOpen
waveInAddBuffer
waveOutClose
Sections
.text Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ