Static task
static1
Behavioral task
behavioral1
Sample
9ff8ef0261f7aecf9968f0b0df44a3cefc8fa63a5d7e8bde9a689d169d69bd14.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ff8ef0261f7aecf9968f0b0df44a3cefc8fa63a5d7e8bde9a689d169d69bd14.exe
Resource
win10v2004-20220812-en
General
-
Target
9ff8ef0261f7aecf9968f0b0df44a3cefc8fa63a5d7e8bde9a689d169d69bd14
-
Size
126KB
-
MD5
7abb85720c64b2f47952deb968740b20
-
SHA1
fba7dd52f6c8a5188d177a2dfbf2505565e5722d
-
SHA256
9ff8ef0261f7aecf9968f0b0df44a3cefc8fa63a5d7e8bde9a689d169d69bd14
-
SHA512
4d8fd71a76714713b86d4b632dfb9babcc5f337b676aa273c714498e8475ce1f579939c267b904ea9cd49153846b5c508a139f718c4932b861da5f9d1190b00b
-
SSDEEP
3072:jiyPAERE/So/arIEKNDZQhutbBb/zpEPAhrlWa7szmH1d:j/PAZAIEk+ybl/tEPAhr8dmHX
Malware Config
Signatures
Files
-
9ff8ef0261f7aecf9968f0b0df44a3cefc8fa63a5d7e8bde9a689d169d69bd14.exe windows x86
1a679f70d926161a52eb276bdd581639
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__assert
__errno
__getreent
__main
_fopen64
_impure_ptr
_stat64
abort
accept
bcopy
bind
calloc
close
connect
cygwin_internal
dll_crt0__FP11per_process
exit
fclose
fgets
fputc
fputs
free
getopt_long
getpagesize
getpid
getprogname
isatty
isspace
kill
listen
malloc
memcpy
memset
openlog
optarg
opterr
optind
optopt
pause
pthread_atfork
pthread_create
pthread_getspecific
pthread_key_create
pthread_mutex_lock
pthread_mutex_unlock
pthread_once
pthread_setspecific
read
realloc
shutdown
sigaction
snprintf
socket
strcasecmp
strcmp
strerror
strlen
strrchr
strtol
strtoul
syslog
time
unlink
write
advapi32
AccessCheck
AdjustTokenPrivileges
AllocateAndInitializeSid
EqualSid
GetKernelObjectSecurity
GetTokenInformation
ImpersonateNamedPipeClient
InitializeSecurityDescriptor
LookupPrivilegeValueA
MapGenericMask
OpenProcessToken
OpenThreadToken
RevertToSelf
SetSecurityDescriptorDacl
kernel32
AddAtomA
CloseHandle
ConnectNamedPipe
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DisconnectNamedPipe
DuplicateHandle
EnterCriticalSection
ExitThread
FindAtomA
FlushFileBuffers
GetAtomNameA
GetCurrentProcess
GetCurrentThread
GetExitCodeProcess
GetExitCodeThread
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetStdHandle
GetThreadPriority
GetVersionExA
InitializeCriticalSection
LeaveCriticalSection
OpenProcess
ReadFile
ReadProcessMemory
ReleaseSemaphore
ResetEvent
SetEvent
SetLastError
SetThreadPriority
Sleep
TerminateThread
WaitForMultipleObjects
WaitForSingleObject
WaitNamedPipeA
WriteFile
WriteProcessMemory
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 17KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE