Static task
static1
Behavioral task
behavioral1
Sample
4c5343f1b8224ddce5a8f0351bcef9c9be39ae406cf6ac91cc2b4d4bacc9755f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c5343f1b8224ddce5a8f0351bcef9c9be39ae406cf6ac91cc2b4d4bacc9755f.exe
Resource
win10v2004-20220812-en
General
-
Target
4c5343f1b8224ddce5a8f0351bcef9c9be39ae406cf6ac91cc2b4d4bacc9755f
-
Size
208KB
-
MD5
96369b5fb8510b87fcdc4b93050b5b71
-
SHA1
37ba36b1ca46861a2deb17ffe533903b437ddda0
-
SHA256
4c5343f1b8224ddce5a8f0351bcef9c9be39ae406cf6ac91cc2b4d4bacc9755f
-
SHA512
c4fce40fc1a3844e85377d4b0778be29f157f0f0c0bb4c0458ae738a271127766b63ee57c883612b432446962961499a4cc09dcc5a3dc97fdec322383c72dd5c
-
SSDEEP
3072:3Q33JW7iMVWZ4cMmBOxf9tZS6KfWIjiU2ZrHQW0cY0DAMqQBQX6Qwe/Qr2WJ:3Q33JW7fsOcN4tZqLjfVW0cBDVqQfmq
Malware Config
Signatures
Files
-
4c5343f1b8224ddce5a8f0351bcef9c9be39ae406cf6ac91cc2b4d4bacc9755f.exe windows x86
0bd8e376944fd3a4d27c1b031c5aeae2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
_beginthreadex
realloc
strncat
exit
wcscpy
_errno
strncmp
printf
time
srand
atoi
rand
strncpy
strcat
strrchr
_except_handler3
free
strcmp
strcpy
malloc
strchr
memcmp
strstr
strlen
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
_strcmpi
_strnicmp
_strrev
memset
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
mfc42
ord2764
ord4129
ord6648
ord537
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord939
ord6877
ord540
ord2818
ord800
kernel32
FindNextFileA
GetStartupInfoA
GetModuleHandleA
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
GetTempPathA
CopyFileA
CreateMutexA
ExitProcess
SetErrorMode
OpenEventA
ReleaseMutex
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentThread
SetThreadPriority
GetSystemInfo
GlobalMemoryStatus
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetProcessHeap
HeapAlloc
HeapFree
GetModuleFileNameA
OutputDebugStringA
InterlockedExchange
MultiByteToWideChar
GetTickCount
ExitThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
GetVersionExA
WinExec
SetLastError
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
RaiseException
LocalFree
FindClose
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
GetProcAddress
LoadLibraryA
CloseHandle
TerminateThread
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
lstrcpyA
Sleep
lstrlenA
user32
CharNextA
MessageBoxA
ExitWindowsEx
LoadCursorA
DestroyCursor
BlockInput
SendMessageA
SystemParametersInfoA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
GetWindowTextA
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CreateWindowExA
CloseWindow
IsWindow
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
Sections
.text Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ