Static task
static1
Behavioral task
behavioral1
Sample
4f88d3c9feba2f5c9d7673bc9280c3e30a238a167e99a6a03ad72204f003d600.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f88d3c9feba2f5c9d7673bc9280c3e30a238a167e99a6a03ad72204f003d600.exe
Resource
win10v2004-20220812-en
General
-
Target
4f88d3c9feba2f5c9d7673bc9280c3e30a238a167e99a6a03ad72204f003d600
-
Size
40KB
-
MD5
4ce9ba20d5756e35b1b0848c09232fef
-
SHA1
b58f8e0be58f2d033eb8cd297623a7687b343098
-
SHA256
4f88d3c9feba2f5c9d7673bc9280c3e30a238a167e99a6a03ad72204f003d600
-
SHA512
b0abbae893d7a6f08a98fcc96c45626c972c1f20fdf73867bbb0a2ce3f26dba751649ca9f352e2c5a1d0fb459d6eb438370082303840b1ab92d93076f678582c
-
SSDEEP
768:pNs3FMSy2SOBpiyg4YAp/9DRmp04nYLKV8MEkrqrj0:pK1MNNO3iL4xKLDrqrj0
Malware Config
Signatures
Files
-
4f88d3c9feba2f5c9d7673bc9280c3e30a238a167e99a6a03ad72204f003d600.exe windows x86
e2635c217b992456f4001f9e3675ad3f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
ExitThread
ExitProcess
GetCurrentProcessId
GetTickCount
HeapAlloc
GetProcessHeap
CloseHandle
TerminateThread
SetFileTime
lstrcatA
GetFileTime
CreateFileA
GlobalFree
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceA
GetTempPathA
CreateThread
GetModuleHandleA
GetStartupInfoA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetModuleFileNameA
CopyFileA
SetFileAttributesA
GetLastError
lstrlenA
LoadLibraryA
GetProcAddress
Sleep
GetVersionExA
GlobalMemoryStatus
WriteFile
GetSystemDirectoryA
user32
wsprintfA
ExitWindowsEx
advapi32
ControlService
AdjustTokenPrivileges
OpenProcessToken
DeleteService
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
RegCloseKey
RegOpenKeyExA
StartServiceCtrlDispatcherA
LookupPrivilegeValueA
mfc42
ord6663
ord800
ord924
ord537
ord6877
ord939
ord2818
ord4278
ord860
ord6648
ord858
ord535
ord540
ord2915
ord2764
ord2846
ord922
ord926
ord5710
ord4129
msvcrt
time
__CxxFrameHandler
srand
strncmp
_except_handler3
printf
fprintf
_iob
_local_unwind2
_mbscmp
strtok
strchr
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
rand
atoi
exit
strstr
urlmon
URLDownloadToFileA
msvcp60
??0Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
ws2_32
gethostbyname
closesocket
connect
htons
inet_addr
socket
send
WSAGetLastError
recv
__WSAFDIsSet
setsockopt
WSAStartup
sendto
WSASocketA
gethostname
WSACleanup
htonl
ntohl
inet_ntoa
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ