Static task
static1
Behavioral task
behavioral1
Sample
0b314dcc72ee4d4709c588dda347b0492a45fb2cc05733e4be5c284fec552750.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b314dcc72ee4d4709c588dda347b0492a45fb2cc05733e4be5c284fec552750.exe
Resource
win10v2004-20220812-en
General
-
Target
0b314dcc72ee4d4709c588dda347b0492a45fb2cc05733e4be5c284fec552750
-
Size
753KB
-
MD5
133fd326bd518563a28ff92f3943c1e3
-
SHA1
6ca778b771cb8ebdc481a1d763c1258234cbf86f
-
SHA256
0b314dcc72ee4d4709c588dda347b0492a45fb2cc05733e4be5c284fec552750
-
SHA512
61e218075fd24ecb9c46d61674765095e36b6c8676b2539eb361c51aac1a4e0539f0234ab20f5555130878204d4bb87ac879cc2e85e6ec86f2fe55bacdbba0ed
-
SSDEEP
384:thN/DeCnYaCkf5FvArKstTEizqwExN1vLOskhA:tv/DbY3kxFvArV4/7xzvLOlA
Malware Config
Signatures
Files
-
0b314dcc72ee4d4709c588dda347b0492a45fb2cc05733e4be5c284fec552750.exe windows x86
6fad233611d2187083d866192101dcb4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
connect
closesocket
send
ioctlsocket
htonl
htons
socket
bind
listen
accept
WSAStartup
recv
mfc42
ord1979
ord5186
ord6055
ord5442
ord1776
ord6385
ord354
ord3663
ord4078
ord5163
ord6374
ord4353
ord5290
ord4407
ord4837
ord4441
ord2648
ord5241
ord6376
ord2385
ord3798
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord2055
ord3262
ord2985
ord3081
ord2976
ord3402
ord3830
ord3831
ord3749
ord3079
ord4080
ord4627
ord4424
ord5065
ord3136
ord858
ord4278
ord2818
ord540
ord6215
ord2092
ord5484
ord366
ord567
ord1105
ord823
ord1168
ord537
ord535
ord860
ord923
ord4277
ord2764
ord3874
ord800
ord922
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3401
ord4622
ord3738
ord561
ord656
ord6010
ord924
ord3610
ord665
ord825
ord3825
ord2864
ord1576
msvcrt
_exit
_XcptFilter
exit
_onexit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??1type_info@@UAE@XZ
_itoa
_CxxThrowException
_mbscmp
atoi
__CxxFrameHandler
rand
__dllonexit
_setmbcp
kernel32
SetFileAttributesA
GetStartupInfoA
GetModuleHandleA
CreateDirectoryA
DeleteFileA
WinExec
GetFileTime
OpenFile
SetFileTime
GetSystemDirectoryA
CloseHandle
GetWindowsDirectoryA
Sleep
user32
InvalidateRect
CloseClipboard
IsWindow
GetForegroundWindow
SendMessageA
MessageBoxA
UpdateWindow
ExitWindowsEx
OpenClipboard
EnableWindow
GetWindow
GetClipboardData
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE