Static task
static1
Behavioral task
behavioral1
Sample
5f4e9031285b5f232e260482a082faeb4665b2a858048393204e2319975dd1e7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f4e9031285b5f232e260482a082faeb4665b2a858048393204e2319975dd1e7.exe
Resource
win10v2004-20220812-en
General
-
Target
5f4e9031285b5f232e260482a082faeb4665b2a858048393204e2319975dd1e7
-
Size
286KB
-
MD5
04e7ad5037181b441952eb43d330f102
-
SHA1
55d90cca9bc9eebe2dd678abf71371d148002aac
-
SHA256
5f4e9031285b5f232e260482a082faeb4665b2a858048393204e2319975dd1e7
-
SHA512
443222a0569301f4307b65b17e26f966ec00442ee0639354f1968309a9e278da3b1890eb74efb78518f623498faffd2fcee6baf3566c4ab8ec648037a3255984
-
SSDEEP
6144:CxeUgNw4cW5zoyfC/erPrHS5Lqej4eKzua9Ky4xxZnXXycOwnFBB0gexnM9u2wkh:oeUav5zoyfprHS5LJj49T9KHxXOwnFBp
Malware Config
Signatures
Files
-
5f4e9031285b5f232e260482a082faeb4665b2a858048393204e2319975dd1e7.exe windows x86
038b40c42fe0f0d741a2e066e0805b87
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
mbstowcs
wcslen
wcstombs
atoi
wcscpy
_strupr
_beginthreadex
memcpy
calloc
_CIacos
printf
_CIpow
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_access
_controlfp
vsprintf
exit
fopen
fwrite
fclose
strrchr
_except_handler3
free
strcmp
strcpy
malloc
memcmp
memset
strlen
_ftol
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
??1type_info@@UAE@XZ
_CxxThrowException
putchar
rand
_chkesp
strncat
__set_app_type
strcat
kernel32
GetExitCodeThread
WideCharToMultiByte
GetStartupInfoA
GetModuleHandleA
LocalFree
TerminateThread
CreateThread
lstrlenA
MultiByteToWideChar
GetLastError
InterlockedDecrement
SetEvent
WaitForSingleObject
LoadLibraryA
GetProcAddress
CloseHandle
Sleep
CreateEventA
user32
GetMessageA
IsWindow
SendMessageA
CreateWindowExA
ws2_32
WSAStartup
setsockopt
connect
htons
getsockname
gethostname
send
select
closesocket
recv
ntohs
socket
gethostbyname
WSACleanup
msvcp60
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ole32
OleRun
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
msvfw32
ICSendMessage
winmm
waveInClose
waveInUnprepareHeader
waveInPrepareHeader
waveOutPrepareHeader
waveOutWrite
waveInOpen
waveInReset
waveInStart
waveOutUnprepareHeader
waveOutOpen
waveInAddBuffer
waveOutClose
Sections
PT#cBdeD Size: 201KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
>RsZeljr Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
P%!>*3mt Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
m::4"b=i Size: 24KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
h]V''"Yy Size: 928B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ