Static task
static1
Behavioral task
behavioral1
Sample
f00caff0604a5176c55bad4f0f86d8efeac5983d54645a71392128b7aad07bb8.exe
Resource
win7-20220812-en
General
-
Target
f00caff0604a5176c55bad4f0f86d8efeac5983d54645a71392128b7aad07bb8
-
Size
157KB
-
MD5
53a4229714681102efb9bd3b7cadee88
-
SHA1
411beb88dfe62f96d55a9f2a6d799808d8a4581f
-
SHA256
f00caff0604a5176c55bad4f0f86d8efeac5983d54645a71392128b7aad07bb8
-
SHA512
00b66f03927784a206104e383efcc96ea94d0f1479e0f4aa1b95ea52379966bb3e73b9b4bc0d6f31cdea6bd768eae337cb6a27523218dc1dbafca6b800e0f16f
-
SSDEEP
3072:5hQ+d6zkPZlL0bXMP0XuurGbaUvYlq6hOttlksrgSYp3M3y61zLMjX/AMWRo1q:r0QP0XM5iOtLHVTkX/Co1q
Malware Config
Signatures
Files
-
f00caff0604a5176c55bad4f0f86d8efeac5983d54645a71392128b7aad07bb8.exe windows x86
9ab933681a73a1920411e9b071947320
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90u
ord1603
ord4784
ord6579
ord905
ord6699
ord6693
ord287
ord1137
ord1108
ord447
ord370
ord3082
ord5007
ord1486
ord6577
ord6807
ord4477
ord265
ord2939
ord2364
ord781
ord579
ord400
ord3534
ord2953
ord2955
ord5943
ord3235
ord338
ord2337
ord614
ord3773
ord3966
ord3959
ord813
ord4490
ord2479
ord4405
ord4519
ord5573
ord3589
ord341
ord4324
ord5939
ord935
ord4044
ord2537
ord595
ord2597
ord1248
ord3355
ord6411
ord1754
ord1751
ord4345
ord1493
ord4664
ord5602
ord2074
ord5512
ord6800
ord4603
ord5664
ord3743
ord5154
ord4702
ord1728
ord6466
ord5685
ord5683
ord960
ord965
ord969
ord967
ord971
ord2615
ord2635
ord2619
ord2625
ord2623
ord2621
ord2638
ord2633
ord2617
ord2640
ord2628
ord2610
ord2612
ord2630
ord2375
ord2368
ord1641
ord2885
ord4174
ord6804
ord3682
ord5404
ord6376
ord3226
ord1442
ord5625
ord2139
ord1675
ord5841
ord1727
ord5650
ord3140
ord4910
ord3674
ord797
ord4211
ord1098
ord5567
ord568
ord571
ord589
ord2208
ord398
ord662
ord938
ord811
ord2694
ord5851
ord6727
ord286
ord296
ord4442
ord280
ord799
ord1250
ord1254
ord1599
ord3220
ord285
ord3185
ord909
ord6630
ord1607
ord1026
ord1484
ord2475
ord6683
ord2981
ord2927
ord3368
ord6673
ord5966
ord4926
ord4788
ord2344
ord2447
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord6782
ord4163
ord2251
ord2206
ord6601
ord3066
ord6593
ord4328
ord5102
ord4617
ord5632
ord4631
ord5167
ord266
ord1272
ord2170
ord4287
ord3085
ord4066
ord3353
ord6408
ord1752
ord1492
ord5653
ord4682
ord5880
ord6295
ord699
ord638
ord6035
ord4179
ord1048
ord5548
ord6741
ord6802
ord4074
ord605
ord1274
ord321
ord1233
ord1145
ord322
ord802
ord1088
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord4347
ord4996
ord5680
ord5663
ord6018
ord2771
ord2983
ord3112
ord4728
ord2966
ord3115
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord5324
ord1810
ord1791
ord4348
ord4905
ord4681
ord3670
ord794
ord600
ord617
ord4043
ord1809
ord3999
ord3793
ord3963
ord1792
ord1298
ord801
msvcr90
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
floor
ceil
_wtoi64
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
_wcsdup
wcsncpy
_CxxThrowException
malloc
_purecall
swscanf_s
wcschr
wcslen
_wtoi
_recalloc
calloc
_invalid_parameter_noinfo
memcpy_s
free
memcmp
_time64
wcscpy_s
_localtime64_s
memset
__CxxFrameHandler3
kernel32
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapFree
GetModuleFileNameW
GetLastError
lstrlenW
CloseHandle
GetExitCodeProcess
CreateProcessW
InterlockedDecrement
GetFileAttributesW
LocalFree
CreateDirectoryW
WaitForSingleObject
GetProcessHeap
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
LocalAlloc
GetTempPathW
GetDiskFreeSpaceExW
SetEvent
user32
IsWindow
LoadIconW
SendMessageW
GetClientRect
GetWindowRect
PostMessageW
KillTimer
EnableWindow
GetDesktopWindow
SetTimer
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyW
RegOpenKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExW
comctl32
ord17
shlwapi
SHDeleteKeyW
PathFindFileNameW
PathStripPathW
PathIsDirectoryW
PathAddBackslashW
PathCombineW
PathFileExistsW
PathAppendW
ole32
CLSIDFromString
StringFromGUID2
OleRun
CoCreateInstance
CoInitializeEx
oleaut32
VarDateFromStr
SysStringByteLen
SysAllocStringByteLen
VariantClear
SysAllocString
VarBstrFromDate
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
GetErrorInfo
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wininet
InternetCrackUrlW
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE