mmmmfr
Static task
static1
Behavioral task
behavioral1
Sample
91ae3d04973c500427297ab7980602c414796759e01cefbdfc1ff45aa922967b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
91ae3d04973c500427297ab7980602c414796759e01cefbdfc1ff45aa922967b.exe
Resource
win10v2004-20220901-en
General
-
Target
91ae3d04973c500427297ab7980602c414796759e01cefbdfc1ff45aa922967b
-
Size
227KB
-
MD5
8265efee6ef206258608a9c8656b47c0
-
SHA1
70e8debb83f627c8daf9248522310fd63c32d74f
-
SHA256
91ae3d04973c500427297ab7980602c414796759e01cefbdfc1ff45aa922967b
-
SHA512
f9f6709c983db4477fa65f74a2bbcd18e8e47a23542bd66da403adaae9cf69ef2a5e33027676c3cb9fbafc32fab34e0b10b9d0ed2370690f8763e7d3dce291cf
-
SSDEEP
6144:VO3eJ8eS6u/faeoSbdGQCwM2pq/dTcEwSacXX96TZSJJQitTB7CO7PC8:Q3eJ8eS6gfaeoSbdGQCwM2pq/dQEwSlh
Malware Config
Signatures
Files
-
91ae3d04973c500427297ab7980602c414796759e01cefbdfc1ff45aa922967b.exe windows x86
5dd2fb917eb193d86b88e5bac4261a6c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_onexit
_invoke_watson
__dllonexit
_unlock
_controlfp_s
_strnicmp
_lock
_decode_pointer
_strupr
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
_stricmp
__getmainargs
_amsg_exit
_except_handler4_common
_snprintf
_beginthreadex
atol
mbstowcs
wcstombs
_errno
_mbscmp
_mbsstr
exit
sprintf
strncmp
atoi
realloc
strncat
srand
rand
printf
_time64
strncpy
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
strrchr
??_U@YAPAXI@Z
free
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
malloc
strchr
memmove
ceil
strstr
memcpy
memset
_CxxThrowException
__CxxFrameHandler3
??3@YAXPAX@Z
??2@YAPAXI@Z
shlwapi
SHDeleteKeyA
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
CreateEventA
CloseHandle
GetProcAddress
LoadLibraryA
WaitForSingleObject
SetEvent
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
InterlockedExchange
CancelIo
lstrcpyA
lstrlenA
lstrcatA
FreeLibrary
lstrcmpA
GetVersionExA
LocalFree
LocalReAlloc
LocalAlloc
GetLastError
SetLastError
VirtualAllocEx
OpenProcess
ExitThread
GetTickCount
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalAlloc
TerminateProcess
WaitForMultipleObjects
GetSystemInfo
OpenEventA
GetModuleFileNameA
lstrcpyW
LocalSize
GetModuleHandleA
GetCurrentThreadId
InterlockedCompareExchange
GetStartupInfoA
GetCurrentProcess
user32
SetThreadDesktop
OpenClipboard
SetCursorPos
GetSystemMetrics
CloseDesktop
GetCursorInfo
GetForegroundWindow
SetCapture
CloseClipboard
ReleaseDC
GetDC
GetDesktopWindow
SetRect
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
LoadCursorA
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
SendMessageA
IsWindow
CreateWindowExA
DestroyCursor
DispatchMessageA
TranslateMessage
GetMessageA
ExitWindowsEx
wsprintfA
MessageBoxA
GetWindowTextA
gdi32
DeleteObject
DeleteDC
CreateCompatibleBitmap
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
GetDIBits
advapi32
AdjustTokenPrivileges
ClearEventLogA
OpenEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
QueryServiceStatus
ControlService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
CreateServiceA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
StartServiceA
UnlockServiceDatabase
LockServiceDatabase
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
winmm
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInReset
waveInStop
waveOutOpen
waveOutGetNumDevs
waveInAddBuffer
waveInStart
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutWrite
waveOutClose
ws2_32
inet_addr
sendto
socket
htons
connect
recv
send
setsockopt
closesocket
WSAStartup
ioctlsocket
listen
accept
getpeername
__WSAFDIsSet
recvfrom
bind
ntohs
getsockname
WSAGetLastError
WSACleanup
htonl
gethostname
select
inet_ntoa
gethostbyname
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
iphlpapi
GetIfTable
msvfw32
ICSeqCompressFrameStart
ICOpen
ICSeqCompressFrame
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
netapi32
NetApiBufferFree
NetUserEnum
NetUserGetLocalGroups
NetUserGetInfo
NetUserSetInfo
NetUserDel
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSLogoffSession
WTSDisconnectSession
WTSFreeMemory
WTSQuerySessionInformationA
WTSEnumerateSessionsA
WTSQuerySessionInformationW
Exports
Exports
Sections
AAAAA Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
JJJ Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ