Static task
static1
Behavioral task
behavioral1
Sample
0087f2044e93131942e274be145618f2fbaae4e41124baa69036dc1f21125655.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0087f2044e93131942e274be145618f2fbaae4e41124baa69036dc1f21125655.exe
Resource
win10v2004-20220812-en
General
-
Target
0087f2044e93131942e274be145618f2fbaae4e41124baa69036dc1f21125655
-
Size
385KB
-
MD5
9110b9a8766b6e52050329ea49b5cb71
-
SHA1
70c4878077cbcad1fededb4c0cb7d54edbcea454
-
SHA256
0087f2044e93131942e274be145618f2fbaae4e41124baa69036dc1f21125655
-
SHA512
2f4d6131ee0cde75ae5e2f04f3f4c9a684b7a70edb0d10dbaa7180e413df6f947dc9230b3f9404f68f50751ee3a5e6c3da1b6e944deae828f33eb430697b28a8
-
SSDEEP
6144:BMuw4LTB3vuq5eK+4CJD1tbpx+8NDs3AwW7mC5YlxxrrLnW6zyneAjlea:Cuw4LTxvusU4C3xVIAwW7mPlXr262lea
Malware Config
Signatures
Files
-
0087f2044e93131942e274be145618f2fbaae4e41124baa69036dc1f21125655.exe windows x86
6a6780db35bbca1336db4e5571f771b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2763
ord6662
ord533
ord5194
ord3811
ord3337
ord6407
ord1997
ord798
ord5710
ord939
ord4129
ord823
ord825
ord537
ord941
ord2764
ord5856
ord540
ord5683
ord4277
ord4278
ord858
ord6874
ord860
ord2818
ord535
ord536
ord2915
ord5572
ord800
ord354
ord5186
ord5773
ord5442
ord1979
ord665
msvcrt
_onexit
__dllonexit
free
malloc
_stricmp
_strnicmp
_exit
_XcptFilter
exit
strcmp
time
srand
rand
strstr
_vsnprintf
_except_handler3
wcslen
_wcsicmp
_mbscmp
sprintf
getenv
strcat
memset
strcpy
__CxxFrameHandler
memcpy
printf
strlen
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strcmpi
kernel32
GetFileSize
CloseHandle
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
CreateThread
CreateFileA
HeapAlloc
GetProcessHeap
GetLastError
OutputDebugStringA
CreateRemoteThread
GetProcAddress
GetModuleHandleA
GetSystemDirectoryA
FindClose
FindFirstFileA
CreateDirectoryA
CreateProcessA
GetStartupInfoA
CopyFileA
WriteFile
MultiByteToWideChar
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
UnmapViewOfFile
ReadProcessMemory
MapViewOfFile
CreateFileMappingA
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
HeapFree
ReadFile
GetLocalTime
SetLocalTime
GetVersionExA
IsBadReadPtr
LocalFree
GetFileInformationByHandle
CreatePipe
GetStdHandle
Sleep
GetVersion
lstrcatA
lstrlenA
VirtualAllocEx
OpenProcess
user32
MessageBoxA
advapi32
AdjustTokenPrivileges
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CloseServiceHandle
StartServiceA
RegCloseKey
RegSetValueExA
RegOpenKeyA
CreateServiceA
OpenSCManagerA
RegEnumValueA
RegOpenKeyExA
SetSecurityInfo
SetEntriesInAclA
GetUserNameA
GetSecurityInfo
LookupPrivilegeValueA
shell32
ShellExecuteA
msvcp60
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 308KB - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ