Static task
static1
Behavioral task
behavioral1
Sample
37ebabcc29c53136e0f0e8e30296290d07b25cc8443b66d8b44e62ed49b52939.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37ebabcc29c53136e0f0e8e30296290d07b25cc8443b66d8b44e62ed49b52939.exe
Resource
win10v2004-20220812-en
General
-
Target
37ebabcc29c53136e0f0e8e30296290d07b25cc8443b66d8b44e62ed49b52939
-
Size
156KB
-
MD5
01042bb82467b61bc8976b75d20dc100
-
SHA1
574a9cfc010263abdec45002208b407f89079d05
-
SHA256
37ebabcc29c53136e0f0e8e30296290d07b25cc8443b66d8b44e62ed49b52939
-
SHA512
c958d2f1e8c750837ea1a7d79a659e3442d24aa89989428bb623903f7c2e74831b02504c2a97dcba4dd478bf556cf62effe27e4d3eddd2f303724bc301219139
-
SSDEEP
3072:vvjTyxXxeDic1obNaUxCq17YOjC9HzoI7h+aS1G0:H6Fxeic1iwkNYOjezo0naG0
Malware Config
Signatures
Files
-
37ebabcc29c53136e0f0e8e30296290d07b25cc8443b66d8b44e62ed49b52939.exe windows x86
0b3e13fa21d13b3ad2524b4f3b26a24f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80
ord6067
ord4125
ord6090
ord1934
ord3210
ord3302
ord1280
ord4353
ord5203
ord310
ord578
ord3761
ord2902
ord4104
ord876
ord5833
ord2322
ord1903
ord762
ord3182
ord4262
ord4486
ord2862
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord1123
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord6724
ord1551
ord1670
ord1671
ord4890
ord4735
ord4212
ord5182
ord2469
ord265
ord266
ord3423
ord2086
ord2991
ord3164
ord760
ord572
ord587
ord3684
ord2367
ord4115
ord5214
ord4232
ord1402
ord5915
ord6725
ord1545
ord3454
ord3195
ord620
ord3163
ord3596
ord2372
ord4580
ord3641
ord1794
ord1084
ord1063
ord354
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord1207
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord2248
ord605
ord2020
ord5975
ord1054
ord3830
ord757
ord566
ord3683
ord4541
ord5233
ord764
msvcr80
_invoke_watson
_controlfp_s
_amsg_exit
_decode_pointer
_onexit
_lock
__dllonexit
_encode_pointer
_unlock
__CxxFrameHandler3
_purecall
_beginthreadex
strftime
_localtime64
_ftime64
_mkdir
printf
_vsnprintf
ftell
fseek
memmove
rand
_time64
srand
strstr
_getcwd
_findfirst64i32
_findnext64i32
strncpy
strcmp
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@XZ
_invalid_parameter_noinfo
malloc
free
strcpy
sprintf_s
strcpy_s
_setmbcp
_open
_lseek
_write
_close
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
sprintf
atoi
memcpy
strtok
fclose
strlen
fread
_initterm_e
_initterm
memset
fopen
exit
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
??1exception@std@@UAE@XZ
__getmainargs
_CxxThrowException
kernel32
GetLastError
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTickCount
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
InterlockedExchange
WaitForSingleObject
TerminateThread
CloseHandle
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
MultiByteToWideChar
lstrlenA
CreateProcessA
user32
EnableWindow
PostMessageA
GetParent
LoadCursorA
SetCursor
InvalidateRect
CopyRect
LoadImageA
LoadIconA
IsWindow
GetWindowRect
GetClientRect
SetWindowRgn
SendMessageA
SystemParametersInfoA
gdi32
DeleteObject
DeleteDC
CombineRgn
CreateRectRgn
BitBlt
GetStockObject
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
_TrackMouseEvent
ws2_32
htons
__WSAFDIsSet
shutdown
setsockopt
closesocket
recv
send
select
WSAGetLastError
connect
socket
inet_addr
WSAStartup
WSAAsyncSelect
inet_ntoa
gethostbyname
WSACleanup
gdiplus
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipLoadImageFromFileICM
GdipLoadImageFromFile
GdipBitmapGetPixel
GdipReleaseDC
GdipDrawImageRectRectI
GdipCreateFromHDC
GdipGetDC
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromScan0
GdipFree
GdipAlloc
GdiplusShutdown
GdiplusStartup
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ