Static task
static1
Behavioral task
behavioral1
Sample
17716651e17382abfbf5be577d30cadf6adeb41e805b7a7a14cd55ba2d193094.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17716651e17382abfbf5be577d30cadf6adeb41e805b7a7a14cd55ba2d193094.exe
Resource
win10v2004-20220812-en
General
-
Target
17716651e17382abfbf5be577d30cadf6adeb41e805b7a7a14cd55ba2d193094
-
Size
108KB
-
MD5
4fc0786e0a1abb333fc916872d51d590
-
SHA1
b614aff665762cda4d5df85354342287ab7a6499
-
SHA256
17716651e17382abfbf5be577d30cadf6adeb41e805b7a7a14cd55ba2d193094
-
SHA512
a21b99ca521a80e21fa4ecfd72fc40a5410d9162386f6bdc0d609c4687749adf3d491df1031a9acab0b98f6ea72e4e722cfd2598eb52df3e6dfcec93a5ad9a34
-
SSDEEP
3072:0f86UMgOrBEqt5TUcKr+G68hTaPFa3Wl2gD:0U6UhOrPirJ1hTaPFP
Malware Config
Signatures
Files
-
17716651e17382abfbf5be577d30cadf6adeb41e805b7a7a14cd55ba2d193094.exe windows x86
c906f7081da8ba16310b9441f0eb3e00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
free
calloc
_beginthreadex
strcmp
rand
memcpy
memmove
atoi
strchr
strncat
_except_handler3
wcscpy
malloc
strrchr
strcpy
strcat
memcmp
??2@YAPAXI@Z
memset
strstr
strlen
_ftol
ceil
__CxxFrameHandler
_CxxThrowException
_strnicmp
??3@YAXPAX@Z
kernel32
InterlockedExchange
RaiseException
GetLastError
VirtualAlloc
FreeLibrary
GetStartupInfoA
GetModuleHandleA
SetErrorMode
ReleaseMutex
GetVersionExA
OutputDebugStringA
LocalAlloc
WriteFile
GetProcessHeap
CreateEventA
Sleep
GetTickCount
CreateProcessA
SetFilePointer
CloseHandle
SetEvent
lstrcpyA
VirtualFree
LoadLibraryA
GetProcAddress
user32
GetThreadDesktop
advapi32
AllocateAndInitializeSid
RegSetValueExA
RegCreateKeyExA
FreeSid
RegSetKeySecurity
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
SHGetSpecialFolderPathA
Sections
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ