Static task
static1
Behavioral task
behavioral1
Sample
0050bc05db09a3bda96f9233e9a2dfdbfb8d451309890be4b0edae9541cc8d68.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0050bc05db09a3bda96f9233e9a2dfdbfb8d451309890be4b0edae9541cc8d68.exe
Resource
win10v2004-20220901-en
General
-
Target
0050bc05db09a3bda96f9233e9a2dfdbfb8d451309890be4b0edae9541cc8d68
-
Size
229KB
-
MD5
6524f6fbb599c376cf85b13c7e32aeb0
-
SHA1
0baab3785934833375ad97ed2b3b395ac433b88c
-
SHA256
0050bc05db09a3bda96f9233e9a2dfdbfb8d451309890be4b0edae9541cc8d68
-
SHA512
d3bb8760b4efc4c8e886d12d23a80e1f9efaac1edd75b20c02439b69d296af8aaf31da86f4d6ac1265763f65b4049379aa847f9f7fe245196ef34dff4617db07
-
SSDEEP
6144:b8Zhc2iGmqhdR5eC7kj02mg/lRX5ccRF6G2:bO8GmwRYCgolgdZ5T2
Malware Config
Signatures
Files
-
0050bc05db09a3bda96f9233e9a2dfdbfb8d451309890be4b0edae9541cc8d68.exe windows x86
4a65c5cc70055c1cb90e95d5e040ea00
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
InterlockedDecrement
OutputDebugStringA
RaiseException
GetLastError
SetUnhandledExceptionFilter
HeapCreate
InterlockedExchange
FindResourceW
HeapFree
LockResource
GetTickCount
SetThreadLocale
FileTimeToSystemTime
LoadLibraryA
LeaveCriticalSection
FreeLibrary
GetVersionExA
LoadResource
GetCPInfo
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
GetVersionExW
HeapAlloc
GetSystemTimeAsFileTime
GetProcAddress
DeleteCriticalSection
IsDebuggerPresent
GetThreadLocale
LoadLibraryExA
GetModuleHandleExW
DebugBreak
SizeofResource
InterlockedExchangeAdd
InterlockedIncrement
MultiByteToWideChar
ExpandEnvironmentStringsW
GetCurrentProcessId
GlobalAlloc
GetSystemInfo
lstrcmpiW
LoadLibraryExW
DelayLoadFailureHook
HeapSize
SetLastError
InitializeCriticalSection
QueryPerformanceCounter
lstrlenW
HeapDestroy
GetCurrentProcess
msvcrt
memset
exit
??1type_info@@UAE@XZ
??0exception@@QAE@ABV0@@Z
__dllonexit
realloc
_initterm
free
__set_app_type
__RTtypeid
memcpy
_amsg_exit
towlower
_onexit
_lock
??0exception@@QAE@ABQBD@Z
_errno
_unlock
_CxxThrowException
_vsnwprintf
??0exception@@QAE@XZ
malloc
memmove
wcsncmp
_XcptFilter
??1exception@@UAE@XZ
__p__commode
?name@type_info@@QBEPBDXZ
?what@exception@@UBEPBDXZ
__getmainargs
wcsrchr
rpcrt4
CStdStubBuffer_Disconnect
CStdStubBuffer_AddRef
IUnknown_QueryInterface_Proxy
NdrCStdStubBuffer_Release
NdrDllUnregisterProxy
NdrDllCanUnloadNow
NdrOleAllocate
IUnknown_AddRef_Proxy
CStdStubBuffer_DebugServerQueryInterface
NdrOleFree
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_QueryInterface
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_Invoke
CStdStubBuffer_Connect
NdrDllGetClassObject
NdrDllRegisterProxy
IUnknown_Release_Proxy
ole32
CoTaskMemRealloc
StringFromGUID2
HWND_UserUnmarshal
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
HWND_UserMarshal
HWND_UserSize
CLSIDFromString
HWND_UserFree
ntdll
RtlIpv4AddressToStringW
RtlIpv6AddressToStringW
DbgPrint
Sections
.text Size: 158KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE