Static task
static1
Behavioral task
behavioral1
Sample
07531bc0ff086e2b558f047cc293644ebc51c4a48f93ab057e597e5bc208f098.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07531bc0ff086e2b558f047cc293644ebc51c4a48f93ab057e597e5bc208f098.exe
Resource
win10v2004-20220812-en
General
-
Target
07531bc0ff086e2b558f047cc293644ebc51c4a48f93ab057e597e5bc208f098
-
Size
149KB
-
MD5
5131974b4460dff915f9aecc13a7e824
-
SHA1
e186eeda703cc4b328e09375b8d21378f6111d83
-
SHA256
07531bc0ff086e2b558f047cc293644ebc51c4a48f93ab057e597e5bc208f098
-
SHA512
1b2d4bbb89b196ceac739d75f954921eabe7f8a961890a8e975362a5c55e6a0b1e4ada3d606cce759b5e3b276845f6dbde0b02464c715cff0d9e50a288462ac6
-
SSDEEP
3072:GQeOfjR2cVCxk+WI0opiKyD/IOSfS0GkKqBtmxmAPx4EA/S:PeON2cVCxk7ooBo1f3wmAppAa
Malware Config
Signatures
Files
-
07531bc0ff086e2b558f047cc293644ebc51c4a48f93ab057e597e5bc208f098.exe windows x86
285d430084961aaa803062c216828f82
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
connect
WSACleanup
WSACloseEvent
recv
send
accept
htonl
htons
WSAEventSelect
select
getsockname
WSAStartup
listen
bind
socket
WSASetEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSACreateEvent
WSAGetLastError
closesocket
ole32
OleInitialize
OleUninitialize
advapi32
EqualSid
CreateServiceA
DeleteService
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
QueryServiceStatus
StartServiceA
ControlService
CloseServiceHandle
RegDeleteValueA
SetServiceStatus
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenThreadToken
OpenProcessToken
GetTokenInformation
FreeSid
AllocateAndInitializeSid
msvcr71
isxdigit
iswctype
fread
sscanf
_strnicmp
_purecall
isdigit
strtod
isspace
getenv
_iob
_vsnprintf
setlocale
strftime
localtime
time
abort
_endthreadex
_beginthreadex
tolower
fgets
??1type_info@@UAE@XZ
__dllonexit
_onexit
__security_error_handler
_c_exit
_exit
_XcptFilter
_cexit
__p___initenv
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
_except_handler3
strcspn
sprintf
fclose
printf
_strtoui64
_strtoi64
strtol
??_U@YAPAXI@Z
localeconv
strtoul
fopen
_errno
strerror
??0bad_cast@@QAE@PBD@Z
??1bad_cast@@UAE@XZ
??0bad_cast@@QAE@ABV0@@Z
fprintf
free
??_V@YAXPAX@Z
memchr
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
_stat
memcpy
__crtLCMapStringA
__pctype_func
isupper
___lc_codepage_func
___lc_handle_func
_unlock
malloc
_lock
___setlc_active_func
___unguarded_readlc_active_add_func
islower
__uncaught_exception
exit
fflush
kernel32
GetTickCount
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
GlobalMemoryStatus
WaitForMultipleObjects
DeviceIoControl
UnmapViewOfFile
VirtualUnlock
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
VirtualLock
LoadLibraryExA
MapViewOfFile
CreateFileMappingA
Sleep
GetSystemTimeAsFileTime
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleHandleA
SetConsoleCtrlHandler
GetCurrentProcessId
OpenProcess
SetPriorityClass
CreateEventA
SetEvent
WaitForSingleObject
GetCurrentThread
WideCharToMultiByte
CreateFileA
GetLogicalDrives
QueryDosDeviceA
GetFullPathNameA
GetLongPathNameA
GetModuleFileNameA
GetThreadLocale
CloseHandle
SetErrorMode
GetVersionExA
GetSystemInfo
LoadLibraryA
GetLastError
GetCurrentProcess
GetProcAddress
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ