Static task
static1
Behavioral task
behavioral1
Sample
f463757831e73f0f5ebca2c446b9632e5f0bb5e3273590398b891b2ceb78d908.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f463757831e73f0f5ebca2c446b9632e5f0bb5e3273590398b891b2ceb78d908.exe
Resource
win10v2004-20220812-en
General
-
Target
f463757831e73f0f5ebca2c446b9632e5f0bb5e3273590398b891b2ceb78d908
-
Size
48KB
-
MD5
4384be69f292d8a4492b6ba5812bc420
-
SHA1
a0a25aa42f487379df39d785ecc747050cf47380
-
SHA256
f463757831e73f0f5ebca2c446b9632e5f0bb5e3273590398b891b2ceb78d908
-
SHA512
31319b21791df947b6e9bc1c9385747280f05766cb60573d021056977374b71179aae9fd1fd4d4377807ddfec1a6c4f4defaa2d76be82fd0947e2f0b58bab6a9
-
SSDEEP
768:pCZMjiJMsk21xT+BOtRY/SmfGrXdOh52mBPuHmCkRMlgstD:ZcPk2vG+Yq6GrXdOh52m0HLkulgstD
Malware Config
Signatures
Files
-
f463757831e73f0f5ebca2c446b9632e5f0bb5e3273590398b891b2ceb78d908.exe windows x86
2abfb21dbfa1afea540d42cc1884f155
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
GetModuleFileNameA
ExitProcess
CloseHandle
ReleaseMutex
OpenMutexA
GetTempPathA
GetEnvironmentVariableA
WaitForSingleObject
GetLastError
CreateMutexA
GetCurrentThreadId
GetWindowsDirectoryA
TerminateProcess
OutputDebugStringA
ExitThread
GetSystemDirectoryA
GetTickCount
GetStartupInfoA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetSystemDefaultUILanguage
GetVersionExA
lstrcpyA
GlobalMemoryStatusEx
GetSystemInfo
GetModuleHandleA
GlobalAlloc
GlobalFree
lstrlenA
LoadLibraryA
GetProcAddress
Sleep
CreateThread
lstrcatA
user32
GetInputState
GetMessageA
GetDesktopWindow
PostThreadMessageA
wsprintfA
advapi32
OpenServiceA
StartServiceCtrlDispatcherA
RegOpenKeyA
OpenSCManagerA
CloseServiceHandle
DeleteService
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
ws2_32
connect
WSAIoctl
setsockopt
send
recv
__WSAFDIsSet
select
WSAStartup
socket
gethostbyname
inet_addr
sendto
WSASocketA
WSACleanup
htonl
inet_ntoa
htons
closesocket
msvcrt
_exit
rand
_strrev
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_except_handler3
strncat
strchr
realloc
malloc
__CxxFrameHandler
_CxxThrowException
atoi
strncpy
strcspn
strstr
sprintf
free
??2@YAPAXI@Z
exit
strncmp
??3@YAXPAX@Z
??1type_info@@UAE@XZ
__dllonexit
_onexit
srand
_XcptFilter
_acmdln
__getmainargs
iphlpapi
GetIfTable
shlwapi
SHDeleteKeyA
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ