Static task
static1
Behavioral task
behavioral1
Sample
73ad2f7fe3726153a97edff5a763158f939426c4cd7e17f2960f1d3a62442ef3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73ad2f7fe3726153a97edff5a763158f939426c4cd7e17f2960f1d3a62442ef3.exe
Resource
win10v2004-20220812-en
General
-
Target
73ad2f7fe3726153a97edff5a763158f939426c4cd7e17f2960f1d3a62442ef3
-
Size
888KB
-
MD5
34d194352e0d82d3f8b9b0cad16aad20
-
SHA1
22325c4543f88269a480bc4c7bd8d3d9531ffb50
-
SHA256
73ad2f7fe3726153a97edff5a763158f939426c4cd7e17f2960f1d3a62442ef3
-
SHA512
dff479609469ad41e87264ab33c3ecd84bb5e6dbf9aed4ab37be439faf4136c90852f9af8305a6599106c0bec7986e3ef4b204e978558f1b556ae7825e5a2e8d
-
SSDEEP
6144:jfCAFURQvIX6+JcSJJPBvYMuq1Ym9hl6a/zRCcmJlqu6mA4fj:mNQgXpCS/BgNq1RhzCld6mAW
Malware Config
Signatures
Files
-
73ad2f7fe3726153a97edff5a763158f939426c4cd7e17f2960f1d3a62442ef3.exe windows x86
27da0ddfe8f2bd2ff910425f02c01901
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__set_app_type
_controlfp
_except_handler3
??3@YAXPAX@Z
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
fwrite
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
fgets
longjmp
_setjmp3
_ftime
_endthreadex
_beginthreadex
printf
sprintf
_errno
strerror
perror
__mb_cur_max
_isctype
_pctype
calloc
fprintf
_iob
fflush
sscanf
strrchr
fseek
_stricmp
__CxxFrameHandler
ftell
fread
fputc
wcscat
fopen
fclose
_ftol
rand
srand
free
malloc
strncat
exit
strncmp
_snprintf
atof
strchr
_vsnprintf
_CxxThrowException
??0exception@@QAE@ABV0@@Z
strtok
strstr
strncpy
system
atoi
_purecall
??2@YAPAXI@Z
_memccpy
_strlwr
_strdup
msvcp60
??0logic_error@std@@QAE@ABV01@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0out_of_range@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
iphlpapi
GetTcpTable
kernel32
OpenProcess
SetThreadContext
ReadFile
SetFilePointer
FindResourceA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetExitCodeThread
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
SetThreadPriority
GetProcessAffinityMask
TlsSetValue
FreeLibrary
WaitForMultipleObjects
CreateEventA
GetCurrentThreadId
DuplicateHandle
InterlockedIncrement
GetThreadPriority
SuspendThread
GetThreadContext
ResumeThread
SetEvent
WaitForSingleObject
ResetEvent
InterlockedDecrement
TerminateThread
DeleteCriticalSection
InitializeCriticalSection
CreateThread
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
GetCurrentProcess
TerminateProcess
WriteFile
LoadResource
SizeofResource
LockResource
MultiByteToWideChar
GetLocalTime
GetLastError
GetTempPathA
CloseHandle
GetStartupInfoA
GetTickCount
DeleteFileA
GetSystemDirectoryA
CreateProcessA
ExpandEnvironmentStringsA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
GetStdHandle
AllocConsole
FreeConsole
Sleep
ExitThread
GetModuleFileNameA
FindFirstFileA
GetFileSize
CreateFileA
FindClose
FindNextFileA
GetProcAddress
LoadLibraryA
GetModuleHandleA
SetFileTime
GetFileTime
GetWindowsDirectoryA
CopyFileA
user32
ExitWindowsEx
wsprintfA
advapi32
SetServiceStatus
RegDeleteValueA
StartServiceA
RegQueryInfoKeyA
RegEnumKeyExA
EnumServicesStatusA
OpenThreadToken
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegQueryValueExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
CloseServiceHandle
CreateServiceA
OpenServiceA
ControlService
DeleteService
OpenSCManagerA
RegSetValueExA
RegCloseKey
ChangeServiceConfig2A
RegCreateKeyExA
GetUserNameA
RegOpenKeyExA
shell32
ShellExecuteA
ws2_32
getsockname
bind
htons
ntohs
socket
connect
WSACleanup
WSAStartup
htonl
gethostbyaddr
send
listen
getpeername
ioctlsocket
ntohl
recvfrom
sendto
setsockopt
WSASocketA
getservbyname
shutdown
WSASetLastError
__WSAFDIsSet
gethostbyname
inet_ntoa
recv
inet_addr
WSAGetLastError
gethostname
WSAIoctl
closesocket
accept
select
mpr
WNetCancelConnection2W
WNetAddConnection2W
psapi
GetModuleBaseNameA
EnumProcesses
EnumProcessModules
dnsapi
DnsQuery_A
Sections
����t Size: 884KB - Virtual size: 884KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE