Static task
static1
Behavioral task
behavioral1
Sample
23de9b9b88ecf4b06595a05538b14db4e8373eb431504b03cb8dae244df5d89b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23de9b9b88ecf4b06595a05538b14db4e8373eb431504b03cb8dae244df5d89b.exe
Resource
win10v2004-20220812-en
General
-
Target
23de9b9b88ecf4b06595a05538b14db4e8373eb431504b03cb8dae244df5d89b
-
Size
288KB
-
MD5
47f6ae2c04f8bea428d07a2107c6e990
-
SHA1
7a685226223a349a054b09cac85c68d79d8b735f
-
SHA256
23de9b9b88ecf4b06595a05538b14db4e8373eb431504b03cb8dae244df5d89b
-
SHA512
5f18a7737dbf4d1486cd34ca30c46852e1386ed60ec63bdfe01d85cb7616ca7922ca164d69924bcbc2e90231852022705713465b37260b931a5fff6d146d520c
-
SSDEEP
6144:AulOw62RfS15xNNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:AuE2ErNxDIBuOFe7/uT
Malware Config
Signatures
Files
-
23de9b9b88ecf4b06595a05538b14db4e8373eb431504b03cb8dae244df5d89b.exe windows x86
6b4c95449063674e060dffe4255777ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetPrivateProfileIntA
CreateProcessA
OutputDebugStringA
CreateToolhelp32Snapshot
Process32First
Module32First
GetProcAddress
Module32Next
LoadLibraryA
FreeLibrary
Process32Next
GetCurrentProcess
GetFileAttributesA
ReadFile
FileTimeToSystemTime
GetPrivateProfileStringA
SetEndOfFile
CreateDirectoryA
GetVersionExA
CopyFileA
GetProcessTimes
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
WriteFile
GetModuleHandleA
SetFilePointer
CloseHandle
CreateFileA
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
GetMessageA
DestroyAcceleratorTable
CreateAcceleratorTableA
TranslateMessage
DispatchMessageA
TranslateAcceleratorA
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoInitialize
msvcp80
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@V?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@0@Z
msvcr80
_exit
memset
??3@YAXPAX@Z
_chmod
_mbsnbcpy_s
_unlink
strcat_s
_mbsrchr
_invalid_parameter_noinfo
_localtime64
_time64
_access
strftime
_getpid
strtoul
_snprintf_s
_vsnprintf_s
_mbschr
strcpy_s
_stricmp
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
__CxxFrameHandler3
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_crt_debugger_hook
_invoke_watson
_controlfp_s
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE