Static task
static1
Behavioral task
behavioral1
Sample
28ef5b96cec831a75eb349a2bc6922fab20ebf685047936e1f01b52b659e64e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
28ef5b96cec831a75eb349a2bc6922fab20ebf685047936e1f01b52b659e64e1.exe
Resource
win10v2004-20220812-en
General
-
Target
28ef5b96cec831a75eb349a2bc6922fab20ebf685047936e1f01b52b659e64e1
-
Size
135KB
-
MD5
5071cbd77f4fbf225d5cde4d068fde50
-
SHA1
336a9f93fc5b003c508f1cabdbe849f76b8acc77
-
SHA256
28ef5b96cec831a75eb349a2bc6922fab20ebf685047936e1f01b52b659e64e1
-
SHA512
0ff42b22e32dbc4a6e899b100ee889aae41be56d87a1cc486c797ca7e0c7763ccd05d36b19a9f3b340fe8cdb4a86c36ca4e83c0c50ef9ba52bdfc7480b676909
-
SSDEEP
3072:g99TAWUbMfhgkOBIt6kqsBwigbBLSUJzUzdsccCCOYT:oAWUbMfhROByMsKDb1qqAbYT
Malware Config
Signatures
Files
-
28ef5b96cec831a75eb349a2bc6922fab20ebf685047936e1f01b52b659e64e1.exe windows x86
2d12332f22521ed248d559a9a83ba57d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
commonprobedll
??1CUSTWebBrowser@@UAE@XZ
?Navigate@CUSTWebBrowser@@QAEXPBDPAUtagVARIANT@@111@Z
??0CUSTWebBrowser@@QAE@XZ
?CloseSocket@CMeasurement@@QAEXXZ
?Checkconnected@CMeasurement@@QAE_NH@Z
?GetPVTPressure@CMeasurement@@QAE_NPAH@Z
?ZeroPVT@CMeasurement@@QAE_NXZ
?OpenSocket@CMeasurement@@QAEHXZ
??0CMeasurement@@QAE@XZ
??1CMeasurement@@UAE@XZ
environment
?MonPrintf@@YAHPBDZZ
??1CRegistryKey@@QAE@XZ
?GetStringValue@CRegistryKey@@QAEHPBDAAV?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@@Z
?OpenEx@CRegistryKey@@QAEHPAUHKEY__@@PBD_NK@Z
??0CRegistryKey@@QAE@XZ
?Close@CRegistryKey@@QAEHXZ
?SetDWORDValue@CRegistryKey@@QAEHPBDI@Z
?Open@CRegistryKey@@QAEHPAUHKEY__@@PBD_NK@Z
mfc100
ord300
ord1316
ord1890
ord381
ord5803
ord8305
ord9286
ord5123
ord11103
ord2846
ord2944
ord2945
ord3484
ord11060
ord2338
ord5253
ord12482
ord10672
ord6128
ord13300
ord7074
ord13302
ord2661
ord3984
ord13980
ord3991
ord4401
ord4368
ord4364
ord4398
ord4419
ord4377
ord4406
ord4415
ord4385
ord4389
ord4393
ord4381
ord4410
ord4373
ord1514
ord1507
ord1509
ord1503
ord1496
ord11188
ord11190
ord12644
ord13299
ord8351
ord9994
ord6217
ord11107
ord8070
ord13294
ord10883
ord3395
ord11025
ord8235
ord13973
ord13972
ord14045
ord14062
ord14058
ord14060
ord14061
ord14059
ord2416
ord7349
ord2878
ord2881
ord12531
ord5532
ord2752
ord2973
ord2974
ord3620
ord9475
ord10360
ord10007
ord8137
ord11067
ord915
ord12962
ord4785
ord1448
ord4283
ord2626
ord5207
ord13045
ord305
ord5242
ord1929
ord4344
ord3390
ord895
ord5777
ord5444
ord11154
ord8222
ord2417
ord12535
ord5534
ord2742
ord3738
ord1900
ord3254
ord7322
ord7581
ord1313
ord7876
ord11744
ord10030
ord1210
ord788
ord310
ord8486
ord3676
ord3618
ord11806
ord7091
ord1732
ord14075
ord10922
ord13181
ord11413
ord7144
ord13483
ord13480
ord13485
ord13482
ord13484
ord13481
ord3409
ord5238
ord11172
ord11180
ord4078
ord7355
ord9449
ord11184
ord11153
ord11787
ord4622
ord4903
ord5095
ord8439
ord4881
ord5098
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord9281
ord8304
ord6112
ord888
ord316
ord9399
ord6835
ord1296
ord946
ord901
ord1288
ord7584
ord7510
ord11726
ord13767
ord4724
ord2163
ord11420
ord13301
ord11421
ord6678
ord7073
ord2847
ord2088
msvcr100
_controlfp_s
_invoke_watson
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
__CxxFrameHandler3
_setmbcp
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
Sleep
GetModuleFileNameA
CloseHandle
CreateMutexA
GetLastError
user32
GetSystemMetrics
LoadImageA
LoadIconW
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
RegisterWindowMessageA
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rrverfo Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE