Static task
static1
Behavioral task
behavioral1
Sample
9bee8dbfef3aab535b4be58f65238e3ea676af3595b48b0e26dc6a901906a212.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9bee8dbfef3aab535b4be58f65238e3ea676af3595b48b0e26dc6a901906a212.exe
Resource
win10v2004-20220812-en
General
-
Target
9bee8dbfef3aab535b4be58f65238e3ea676af3595b48b0e26dc6a901906a212
-
Size
196KB
-
MD5
62645548ca307bcf03c581ebb8a74640
-
SHA1
9bb1f3befc7c28eb99d383141f51794c65219275
-
SHA256
9bee8dbfef3aab535b4be58f65238e3ea676af3595b48b0e26dc6a901906a212
-
SHA512
5b580943e63ba6310c68c7dfe16f7343d63e348fd960ef7abf7fb592d025516c5e82f1afad332fe88f99610542960287346fe38fef852730723140bed818e94c
-
SSDEEP
3072:0fSN+NFHkfBOdHSiUcamTvtsZDiFiXlEzctY4CwqCw2728qsx3GCH:EkfBqanV4ctY4CXM7lqso
Malware Config
Signatures
Files
-
9bee8dbfef3aab535b4be58f65238e3ea676af3595b48b0e26dc6a901906a212.exe windows x86
5cd66c523b031885a280cd3c656c0224
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_ntoa
gethostbyname
gethostname
WSAStartup
WSACleanup
mfc42
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord4234
ord3610
ord2411
ord2023
ord4218
ord2578
ord6055
ord1776
ord4398
ord5290
ord3402
ord3582
ord1146
ord1168
ord567
ord541
ord2135
ord2301
ord2299
ord2302
ord5953
ord2864
ord6215
ord2086
ord4160
ord2863
ord2379
ord755
ord470
ord6334
ord2820
ord3811
ord6199
ord3092
ord3097
ord2764
ord4299
ord6880
ord5981
ord3317
ord6883
ord6662
ord5608
ord939
ord941
ord5710
ord2763
ord6877
ord4202
ord4224
ord1200
ord5353
ord5808
ord5204
ord3619
ord3721
ord795
ord1641
ord3626
ord2414
ord4284
ord4275
ord5875
ord3874
ord389
ord353
ord5683
ord1988
ord2393
ord5207
ord1997
ord6392
ord798
ord5194
ord533
ord1075
ord3229
ord1228
ord668
ord3178
ord4058
ord2781
ord2770
ord356
ord6059
ord2976
ord765
ord6779
ord6453
ord1949
ord4034
ord6242
ord2867
ord6467
ord3571
ord640
ord4710
ord6172
ord5873
ord5785
ord1640
ord323
ord6157
ord1795
ord2575
ord4396
ord609
ord2567
ord613
ord289
ord5781
ord3089
ord2860
ord3706
ord2452
ord1906
ord2971
ord5759
ord6192
ord5756
ord6186
ord4330
ord6189
ord6021
ord5789
ord5794
ord5678
ord5736
ord5579
ord5571
ord6061
ord5864
ord3596
ord2753
ord6734
ord3693
ord816
ord4133
ord4297
ord5788
ord562
ord925
ord3574
ord5787
ord283
ord1576
ord4083
ord4023
ord2754
ord2243
ord4123
ord3733
ord810
ord4271
ord6008
ord3914
ord2859
ord6605
ord3296
ord3752
ord2380
ord3303
ord3290
ord4125
ord3297
ord2862
ord2713
ord3573
ord6194
ord4220
ord2584
ord3654
ord2455
ord6270
ord1644
ord2438
ord5651
ord3127
ord3616
ord3318
ord350
ord1176
ord3643
ord394
ord696
ord909
ord5628
ord4185
ord1243
ord1578
ord600
ord826
ord269
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord4998
ord4853
ord4376
ord5265
ord6394
ord5834
ord5450
ord3903
ord823
ord2107
ord2044
ord860
ord2725
ord924
ord5583
ord2818
ord922
ord6876
ord2915
ord5572
ord1134
ord2621
ord2514
ord818
ord616
ord656
ord2448
ord2841
ord801
ord690
ord641
ord3663
ord815
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord2450
ord3830
ord2554
ord4486
ord6375
ord4274
ord4673
ord6010
ord926
ord5856
ord6385
ord540
ord5442
ord6778
ord4129
ord800
ord4278
ord858
ord535
ord354
ord5186
ord1979
ord537
ord665
ord825
ord3698
ord3797
msvcrt
_mbsstr
__set_app_type
sprintf
strrchr
strstr
strncpy
atoi
_mbscmp
__CxxFrameHandler
_setmbcp
_mbsicmp
_ftol
strchr
_purecall
_EH_prolog
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_except_handler3
_controlfp
_access
kernel32
LocalAlloc
LocalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GetPrivateProfileIntA
GetModuleHandleA
MoveFileExA
MultiByteToWideChar
lstrcatA
lstrlenA
WinExec
lstrcpyA
SetFileAttributesA
DeleteFileA
CopyFileA
SetCurrentDirectoryA
CreateDirectoryA
GetPrivateProfileStringA
LoadLibraryA
GetProcAddress
FreeLibrary
FindFirstFileA
CreateProcessA
Sleep
GetCurrentDirectoryA
GetModuleFileNameA
GetCurrentThreadId
GetStartupInfoA
user32
GetSystemMenu
AppendMenuA
SendMessageA
SetForegroundWindow
LoadCursorA
LoadIconA
UpdateWindow
InvalidateRect
SetWindowRgn
SetCursor
DrawIcon
GetDlgItem
GetWindowTextA
GetDlgCtrlID
GetSysColor
GetParent
GetClassNameA
SetWindowsHookExA
UnhookWindowsHookEx
GetWindowRgn
GetDesktopWindow
EnumChildWindows
GetClientRect
GetSystemMetrics
IsIconic
GetWindowRect
GetFocus
CharUpperA
EnableWindow
MoveWindow
SystemParametersInfoA
ShowWindow
GetDC
ReleaseDC
SetWindowPos
GetWindowLongA
RedrawWindow
GetWindowDC
PtInRect
IsWindow
InflateRect
GetNextDlgGroupItem
LoadImageA
CopyRect
DrawFocusRect
SetWindowLongA
CallWindowProcA
GrayStringA
DrawTextA
TabbedTextOutA
SetCapture
ReleaseCapture
SetActiveWindow
gdi32
DeleteDC
GetDIBits
CreateICA
SelectClipRgn
CreateRectRgn
PtInRegion
CreatePen
PtVisible
RectVisible
TextOutA
ExtCreateRegion
Escape
SetTextColor
SetBkColor
GetTextMetricsA
PatBlt
RoundRect
GetTextExtentPoint32A
GetTextColor
FillRgn
GetWindowOrgEx
CreateRectRgnIndirect
StretchBlt
CreateCompatibleDC
CreateCompatibleBitmap
GetDeviceCaps
SelectPalette
RealizePalette
SelectObject
BitBlt
CreateBitmap
DeleteObject
CreateSolidBrush
GetStockObject
ExtTextOutA
CreateFontIndirectA
GetObjectA
advapi32
RegQueryValueA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
shell32
SHFileOperationA
ShellExecuteA
SHGetSpecialFolderPathA
comctl32
_TrackMouseEvent
ImageList_Draw
ole32
CoInitialize
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
olepro32
ord251
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
sҹΣu Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE