Static task
static1
Behavioral task
behavioral1
Sample
69643a82b92ba23475e6de7d42165a54d40ac6100a661513a6d6b940c2748c45.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
69643a82b92ba23475e6de7d42165a54d40ac6100a661513a6d6b940c2748c45.exe
Resource
win10v2004-20220901-en
General
-
Target
69643a82b92ba23475e6de7d42165a54d40ac6100a661513a6d6b940c2748c45
-
Size
16KB
-
MD5
5b617cd8964401255c535fd10da0ee40
-
SHA1
74dcbc88a91c55d5be958fc8a0e9e1a38a94c447
-
SHA256
69643a82b92ba23475e6de7d42165a54d40ac6100a661513a6d6b940c2748c45
-
SHA512
e15d6b856670014844d859a1bb5c55adf1daa009e8fa8067c4178ee2a8acb5f973699cc5acb146e4428c78d4fcb5c0764e689844535c27e99a3b011110790cff
-
SSDEEP
192:J20NGKTcvITm++JD+7fZQHCZBAlVW52DKhctfdwFP1oynR7:frOwxB+VteTx1n
Malware Config
Signatures
Files
-
69643a82b92ba23475e6de7d42165a54d40ac6100a661513a6d6b940c2748c45.exe windows x86
f34b43334615a43a019babd6f3a14308
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
Process32Next
TerminateProcess
OpenProcess
GetModuleFileNameA
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetCurrentProcess
GetStartupInfoA
FreeLibrary
CloseHandle
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetVersion
GetVersionExA
GetCurrentThread
Sleep
CreateMutexA
GetLastError
GetCurrentProcessId
user32
UpdateWindow
DispatchMessageA
ExitWindowsEx
SetTimer
KillTimer
MessageBoxA
DestroyWindow
PostQuitMessage
LoadCursorA
LoadIconA
RegisterClassA
TranslateMessage
GetMessageA
SendMessageA
DefWindowProcA
ShowWindow
CreateWindowExA
gdi32
GetStockObject
advapi32
OpenProcessToken
GetUserNameA
AdjustTokenPrivileges
OpenThreadToken
ImpersonateSelf
LookupPrivilegeValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
wsock32
recv
closesocket
send
WSAAsyncSelect
WSACleanup
WSAGetLastError
connect
htons
ioctlsocket
socket
WSAStartup
msvcp60
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEHXZ
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@D@Z
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
printf
__CxxFrameHandler
__p__commode
strcat
malloc
memset
free
memcpy
atoi
sprintf
_beginthreadex
__p__fmode
__set_app_type
_except_handler3
_controlfp
_stricmp
strcpy
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE