Static task
static1
Behavioral task
behavioral1
Sample
a99f42418f5dc436bfd610db9a5272528bef191290495beea1765b0b3267fcab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a99f42418f5dc436bfd610db9a5272528bef191290495beea1765b0b3267fcab.exe
Resource
win10v2004-20220812-en
General
-
Target
a99f42418f5dc436bfd610db9a5272528bef191290495beea1765b0b3267fcab
-
Size
136KB
-
MD5
63ce1d300b9143b567cdc0a4a66bd030
-
SHA1
e445574b3bc321aef58b4fec8fadc7e49c0ee9f5
-
SHA256
a99f42418f5dc436bfd610db9a5272528bef191290495beea1765b0b3267fcab
-
SHA512
11ac22715d70112b2aedbda3133039c2be71061118d388882c47a92e80244b2d4a511372282f76fcd2e29b36b766a877610fffd62ff32e9ffebea1870dbaeca6
-
SSDEEP
1536:3Pa0EbLWsILX0bp0XQnxvjlOmOSiyvBMypNzIHPC+h+2nM3fa2TcLR0fLzkOzJdP:3PaRjpcfyqy7UsCYa2TURmLzkO9d1p
Malware Config
Signatures
Files
-
a99f42418f5dc436bfd610db9a5272528bef191290495beea1765b0b3267fcab.exe windows x86
70b5a805c447d02a20673e253a363633
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalReAlloc
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
CreateProcessA
CreateThread
InitializeCriticalSection
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
LocalFree
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
GetSystemInfo
GetComputerNameA
GetModuleFileNameA
OpenEventA
SetErrorMode
ExitProcess
GetModuleHandleA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
CreateDirectoryA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetWindowsDirectoryA
lstrcatA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
Sleep
CloseHandle
GetProcAddress
FreeLibrary
SetEvent
WaitForSingleObject
LoadLibraryA
GlobalAlloc
user32
CharNextA
ExitWindowsEx
GetWindowTextA
MessageBoxA
LoadCursorA
BlockInput
SendMessageA
keybd_event
MapVirtualKeyA
mouse_event
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
wsprintfA
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
DestroyCursor
GetCursorInfo
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
PostMessageA
OpenDesktopA
IsWindow
CloseWindow
GetThreadDesktop
DispatchMessageA
GetMessageA
TranslateMessage
GetSystemMetrics
advapi32
LsaClose
RegQueryValueExA
RegOpenKeyExA
IsValidSid
LookupAccountNameA
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegSetValueExA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
CloseServiceHandle
DeleteService
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetKeySecurity
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
LookupAccountSidA
GetTokenInformation
RegOpenKeyA
RegCloseKey
shell32
SHGetSpecialFolderPathA
msvcrt
_except_handler3
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_strrev
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
fopen
_beginthreadex
strncat
wcscpy
_errno
strcat
strncmp
strrchr
atoi
??0exception@@QAE@ABQBD@Z
free
malloc
strcmp
strchr
strncpy
sprintf
strcpy
rand
memcmp
strstr
memset
??2@YAPAXI@Z
putchar
??3@YAXPAX@Z
memcpy
puts
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strlen
ws2_32
send
inet_addr
connect
sendto
WSASocketA
htonl
inet_ntoa
ntohs
getsockname
bind
getpeername
accept
listen
recvfrom
__WSAFDIsSet
closesocket
select
recv
WSAStartup
WSAIoctl
setsockopt
socket
gethostbyname
htons
WSACleanup
netapi32
NetUserAdd
NetLocalGroupAddMembers
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ