Static task
static1
Behavioral task
behavioral1
Sample
11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe
Resource
win10v2004-20220812-en
General
-
Target
11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2
-
Size
29KB
-
MD5
7cf60409e7500ebf687a8834f9adb465
-
SHA1
9950d39b3e4bdf7ea862e4f92f9e8c9577fc00e9
-
SHA256
11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2
-
SHA512
138a3c8a675aed4ae3173621f57c1c728dd20d16acdc09bcedb73fa384fbb940b47b84a13835595220dfaba92679c3a670553e566ee7a91d616e187a6a30b7ff
-
SSDEEP
768:f09zbo9NRL6sA00H3lhVRut/bJFXk3mSoK:fEbof8nNHlRMbJFXk3mSoK
Malware Config
Signatures
Files
-
11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe windows x86
f4e5d4b9147ce888b2251d0f0d021c52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
DeleteFileA
ReleaseMutex
OpenMutexA
InterlockedExchange
CreateThread
WaitForSingleObject
GetLastError
CreateMutexA
SetPriorityClass
GetModuleFileNameA
GetStartupInfoA
ResumeThread
SetThreadPriority
GetCurrentThread
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
CreateProcessA
CopyFileA
lstrcmpiA
GetModuleHandleA
SetErrorMode
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
TerminateProcess
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
ReadFile
GetFileSize
SetFilePointer
CreateFileA
GetCurrentProcess
CloseHandle
lstrcpyA
GetVersionExA
GlobalMemoryStatusEx
GetSystemDefaultUILanguage
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
GetWindowsDirectoryA
GetSystemDirectoryA
GlobalAlloc
GlobalFree
GetCurrentProcessId
OutputDebugStringA
Sleep
SetFileAttributesA
user32
wsprintfA
ExitWindowsEx
advapi32
DeleteService
RegOpenKeyA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CreateServiceA
StartServiceCtrlDispatcherA
StartServiceA
shell32
ShellExecuteA
ws2_32
socket
closesocket
WSAStartup
WSASocketA
__WSAFDIsSet
send
htonl
sendto
inet_addr
gethostbyname
select
connect
WSAIoctl
shutdown
htons
recv
setsockopt
msvcrt
strstr
strcspn
strncpy
sprintf
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??3@YAXPAX@Z
memmove
atoi
rand
srand
??2@YAPAXI@Z
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
shlwapi
SHDeleteKeyA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.qiang Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE