Static task
static1
Behavioral task
behavioral1
Sample
476b2182356f33c7fff58f63e04bd010ca038ba1199769814b7068fbf8781acd.exe
Resource
win7-20220812-en
General
-
Target
476b2182356f33c7fff58f63e04bd010ca038ba1199769814b7068fbf8781acd
-
Size
521KB
-
MD5
4b7bb68cbfb9cde7d6fbbd9a9cd8a9c0
-
SHA1
0887e256703c7386fe77d630e9b9b10a392a4c89
-
SHA256
476b2182356f33c7fff58f63e04bd010ca038ba1199769814b7068fbf8781acd
-
SHA512
6d5afbe8f1a0baffc63abc26ede0480bbb95699a6f7ed9b0a32612d4f31a2b946e4e75267e44b1ecd243c6b0dc0fafda3900bd133b3820399f468aaf16a30bf7
-
SSDEEP
12288:ipxeKqn0TeOssq9fThq3aGxsJYw90YJNII8:ipxe1ZOss0f6aGxCYwRNg
Malware Config
Signatures
Files
-
476b2182356f33c7fff58f63e04bd010ca038ba1199769814b7068fbf8781acd.exe windows x86
4601ab6e0a8062b92584cad752042dae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord4835
ord4441
ord2648
ord2055
ord6376
ord3798
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord491
ord768
ord1641
ord489
ord3626
ord2414
ord4258
ord6197
ord4710
ord4976
ord2864
ord2379
ord2754
ord5875
ord4478
ord6055
ord1776
ord5290
ord4837
ord3610
ord656
ord567
ord4275
ord3402
ord3721
ord795
ord1146
ord1168
ord2614
ord2764
ord926
ord536
ord4219
ord2581
ord4401
ord1771
ord6366
ord2413
ord2024
ord3639
ord699
ord686
ord692
ord397
ord384
ord2860
ord2096
ord6453
ord3803
ord2859
ord3619
ord4123
ord4188
ord2753
ord4124
ord2639
ord4284
ord955
ord640
ord6654
ord283
ord1640
ord323
ord3797
ord613
ord5789
ord289
ord3089
ord5981
ord5710
ord5593
ord3438
ord912
ord5280
ord3597
ord641
ord324
ord2302
ord4234
ord6215
ord6880
ord6199
ord2645
ord4476
ord4160
ord4400
ord3630
ord682
ord6242
ord3706
ord4133
ord4297
ord5788
ord472
ord5786
ord3571
ord755
ord2405
ord6374
ord5287
ord2567
ord2862
ord4774
ord2582
ord3370
ord4402
ord3640
ord693
ord4243
ord6007
ord3286
ord3998
ord6696
ord2385
ord5163
ord3293
ord6905
ord6888
ord3910
ord6907
ord6883
ord541
ord3742
ord818
ord4396
ord3574
ord609
ord5781
ord3874
ord6241
ord4224
ord2452
ord3698
ord765
ord2078
ord4083
ord2575
ord2642
ord3093
ord1783
ord3092
ord1908
ord1690
ord2528
ord5288
ord4439
ord2054
ord4431
ord771
ord1008
ord496
ord4259
ord6176
ord1768
ord4715
ord2863
ord4287
ord5850
ord2882
ord2646
ord6380
ord4278
ord6662
ord801
ord6143
ord1233
ord1871
ord2448
ord5834
ord2044
ord5601
ord2827
ord2820
ord3811
ord665
ord1979
ord5442
ord5186
ord354
ord857
ord861
ord1572
ord2817
ord1175
ord2233
ord296
ord617
ord5222
ord5221
ord5219
ord3643
ord3584
ord696
ord543
ord394
ord803
ord6418
ord2393
ord6307
ord909
ord4167
ord521
ord825
ord5628
ord548
ord4185
ord1166
ord2763
ord6223
ord2919
ord6442
ord5590
ord3258
ord1265
ord6928
ord4353
ord5241
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord2818
ord860
ord2915
ord5572
ord6663
ord537
ord4202
ord540
ord535
ord800
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4854
ord4377
ord5265
ord4358
ord4948
ord4742
ord4905
ord5160
ord5162
ord5161
ord3573
ord1907
ord5683
ord4129
ord6383
ord5440
ord2107
ord6394
ord5450
ord2841
ord6876
ord922
ord1187
ord6877
ord4204
ord538
ord6282
ord6283
ord939
ord3663
ord858
ord941
ord542
ord6569
ord802
ord1134
ord2621
ord924
ord5214
ord3401
ord3953
ord2725
ord561
ord823
ord815
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3996
ord3301
ord5785
ord470
ord1263
ord3613
ord3126
ord6467
ord1799
ord3353
ord614
ord290
ord4003
ord2729
ord2727
ord2730
ord1576
ord4226
ord446
ord743
ord3127
ord3616
ord5651
ord350
ord5608
ord3579
msvcrt
_exit
_XcptFilter
_iob
_onexit
__dllonexit
_mbsstr
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_snprintf
_beginthreadex
exit
srand
free
atol
fgetc
fputc
rand
_initterm
_acmdln
calloc
__getmainargs
_except_handler3
fgets
_mbsicmp
fopen
_ftol
_stricmp
realloc
malloc
sprintf
_setmbcp
_splitpath
strncpy
strncat
strtoul
_mbsnbcpy
atoi
__RTDynamicCast
memmove
strchr
abs
memcmp
_rmtmp
time
strlen
memset
memcpy
__p___argc
__p___argv
_mbscmp
_purecall
__CxxFrameHandler
fclose
fwrite
tmpfile
ftell
fseek
fread
_controlfp
kernel32
GetFileSize
WritePrivateProfileStringA
CreateWaitableTimerA
SetWaitableTimer
GetModuleHandleA
WideCharToMultiByte
MultiByteToWideChar
GetLogicalDrives
GetDriveTypeA
GetVolumeInformationA
ReadFile
CreateProcessA
GetStdHandle
CreatePipe
GetCurrentProcess
DuplicateHandle
GetProcAddress
FreeLibrary
LoadLibraryA
lstrcpynA
GetFileAttributesExA
GetModuleFileNameA
GetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
Sleep
GetVersionExA
GetVersion
GetSystemDirectoryA
GetWindowsDirectoryA
lstrlenA
OpenMutexA
CreateMutexA
WaitForSingleObject
CloseHandle
ReleaseMutex
GetCurrentProcessId
WriteFile
SetFilePointer
lstrcmpiA
OpenProcess
CreateEventA
CreateDirectoryA
SetEvent
ResetEvent
HeapFree
GetProcessHeap
HeapAlloc
SetEndOfFile
GlobalFree
SetThreadPriority
TerminateThread
WaitForMultipleObjects
GetTempPathA
SetFileAttributesA
CopyFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcatA
GetShortPathNameA
MoveFileExA
GetStartupInfoA
GetComputerNameA
GetTempFileNameA
CreateFileA
lstrlenW
user32
CreateWindowExA
RegisterWindowMessageA
GetDesktopWindow
GetWindowRect
FindWindowA
DestroyWindow
RedrawWindow
GetWindowLongA
AdjustWindowRectEx
GetSystemMenu
GetDC
LoadBitmapA
GetParent
TranslateMessage
DrawFocusRect
OffsetRect
SetRect
DispatchMessageA
GetClientRect
CopyRect
DrawStateA
ReleaseDC
InsertMenuA
GetKeyState
LoadImageA
PostMessageA
ClientToScreen
IsWindow
GetCursorPos
LoadIconA
FillRect
InvalidateRect
SetCursor
DestroyIcon
GetMessageA
KillTimer
GetSysColor
SendMessageA
EnableWindow
LoadCursorA
PtInRect
ScreenToClient
GetMessagePos
ShowCursor
gdi32
GetCurrentObject
CreateCompatibleDC
CreateRoundRectRgn
DeleteObject
GetStockObject
CreateSolidBrush
CreateCompatibleBitmap
BitBlt
CreateRectRgnIndirect
GetTextExtentPoint32A
GetTextMetricsA
CreateFontIndirectA
GetObjectA
advapi32
GetUserNameA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
Shell_NotifyIconA
SHGetSpecialFolderPathA
comctl32
ImageList_GetImageCount
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_Draw
ImageList_GetIconSize
ImageList_GetIcon
ImageList_Remove
ImageList_AddMasked
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CoFreeLibrary
CoLoadLibrary
CoTaskMemAlloc
StgCreateDocfile
StgOpenStorage
CoCreateGuid
CoTaskMemFree
oleaut32
VariantClear
wininet
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetErrorDlg
InternetOpenA
InternetSetStatusCallback
InternetQueryOptionA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetReadFileExA
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@UAE@XZ
??_D?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?str@?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?setw@std@@YA?AU?$_Smanip@H@1@H@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@G@Z
??0?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
netapi32
Netbios
ws2_32
ntohl
WSAStartup
gethostname
inet_ntoa
WSACleanup
inet_addr
htons
gethostbyname
htonl
socket
sendto
closesocket
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
shlwapi
PathFileExistsA
Sections
.text Size: 252KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE