Static task
static1
Behavioral task
behavioral1
Sample
f5d5e925b86a8ed4eadbcd75a6230ccdc67ff8d46030e062ead2ff97d16668d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5d5e925b86a8ed4eadbcd75a6230ccdc67ff8d46030e062ead2ff97d16668d6.exe
Resource
win10v2004-20220812-en
General
-
Target
f5d5e925b86a8ed4eadbcd75a6230ccdc67ff8d46030e062ead2ff97d16668d6
-
Size
188KB
-
MD5
5d4755637daa4b4882c37fe8379ec4a1
-
SHA1
7611c0f90f909f15182065b985fa2d7b24a510ff
-
SHA256
f5d5e925b86a8ed4eadbcd75a6230ccdc67ff8d46030e062ead2ff97d16668d6
-
SHA512
101ac7cb83016d6e59a29c90956d210c8cb05b9aa33f7306474118585c10e936965993cd272518ca5b619bb93c72d7fc2bc437d8284b9e99f734acd572586bdb
-
SSDEEP
3072:cm0qPYBmEzM38GF0zCErvX0jSaSP8puCKpr4cYgy5+6oD82EA:cmR6YtFvEr5aSEpuC6k3PeDv
Malware Config
Signatures
Files
-
f5d5e925b86a8ed4eadbcd75a6230ccdc67ff8d46030e062ead2ff97d16668d6.exe windows x86
648236995819d2f8a12e90e07dc0fb6d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord4486
ord4262
ord3182
ord605
ord715
ord741
ord587
ord4035
ord2164
ord1903
ord2095
ord1591
ord5915
ord1402
ord4240
ord5214
ord2991
ord3317
ord572
ord2086
ord1545
ord4232
ord3164
ord1643
ord1581
ord2172
ord354
ord1794
ord4749
ord709
ord501
ord6067
ord4212
ord4580
ord3684
ord3337
ord760
ord416
ord651
ord1979
ord1565
ord628
ord378
ord1482
ord911
ord5563
ord784
ord1003
ord304
ord5403
ord2468
ord531
ord1185
ord723
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord300
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord5182
ord3641
ord1024
ord1123
ord876
ord2322
ord907
ord6174
ord6180
ord265
ord310
ord2248
ord1161
ord1290
ord548
ord4044
ord578
ord6090
ord559
ord747
ord3174
ord6205
ord266
ord1063
ord1084
ord3683
ord762
ord764
ord566
ord442
ord757
ord675
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord1187
ord3292
ord1207
msvcr71
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_setmbcp
_purecall
_mbstok
_splitpath
_mbsicmp
malloc
free
_initterm
__setusermatherr
_adjust_fdiv
_except_handler3
__p__commode
__p__fmode
__set_app_type
__security_error_handler
_controlfp
__CxxFrameHandler
strcpy
sprintf
_CxxThrowException
memcmp
_mbsnbcpy
strlen
memset
memcpy
rand
srand
time
atol
atof
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_c_exit
wcslen
_vsnprintf
_mbscmp
_mbsnbcmp
_mbslen
_mbsinc
_mbclen
_mbctype
strcat
_ismbcdigit
atoi
_exit
kernel32
OpenProcess
SetLastError
LoadLibraryExA
InterlockedDecrement
FreeLibrary
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalFree
OpenMutexA
GetCurrentProcess
lstrlenA
WaitForSingleObject
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
SetEvent
WaitForMultipleObjects
CreateThread
CreateEventA
GetLocalTime
InterlockedIncrement
GetWindowsDirectoryA
CloseHandle
CreateProcessA
IsBadStringPtrA
lstrcmpA
LocalAlloc
GetProcAddress
GetSystemDirectoryA
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
SetThreadPriority
user32
GetClientRect
EnableWindow
GetSystemMetrics
SetTimer
LoadStringA
GetWindowThreadProcessId
GetShellWindow
wsprintfA
RegisterWindowMessageA
IsIconic
IsWindow
LoadIconA
PostThreadMessageA
SetForegroundWindow
PostMessageA
SendMessageA
DrawIcon
CreateWindowExA
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RevertToSelf
OpenProcessToken
FreeSid
EqualSid
IsValidSid
AllocateAndInitializeSid
GetTokenInformation
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CreateProcessAsUserA
shell32
ShellExecuteA
Shell_NotifyIconA
comctl32
ImageList_GetImageCount
ImageList_GetIcon
ole32
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoInitialize
OleRun
oleaut32
GetErrorInfo
SysFreeString
VariantClear
SysAllocStringByteLen
SysStringByteLen
SysStringLen
VariantCopy
VariantInit
SystemTimeToVariantTime
SysAllocString
VariantChangeType
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE