Static task
static1
Behavioral task
behavioral1
Sample
73f06bed13e22c2ab8b41bde5fc32b6d91680e87d0f57b3563c629ee3c479e73_unpacked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73f06bed13e22c2ab8b41bde5fc32b6d91680e87d0f57b3563c629ee3c479e73_unpacked.exe
Resource
win10v2004-20220812-en
General
-
Target
73f06bed13e22c2ab8b41bde5fc32b6d91680e87d0f57b3563c629ee3c479e73_unpacked
-
Size
368KB
-
MD5
379ba8e55498cb7a71ec4dcd371968af
-
SHA1
5f522dda6b003b151ff60b83fe326400b9ed7716
-
SHA256
3eb9bbe3ed251ec3fd1ff9dbcbe4dd1a2190294a84ee359d5e87804317bac895
-
SHA512
03faa3296eeeb5c100bfd80ebde8db37b352dd3fdfa73482a399fa4ce53c27abc915483f26e27371a2b45944f111ac286a8c273ca7c59dcac02e804e8fa920e3
-
SSDEEP
6144:MsDnP1qTkUyioNn35D2BRkcVDnDqqOkqXngsDnWSk8YlD7W3/:TzP1qNyio9pyBRk2zDnsDV6G3/
Malware Config
Signatures
Files
-
73f06bed13e22c2ab8b41bde5fc32b6d91680e87d0f57b3563c629ee3c479e73_unpacked.exe windows x86
3837aaa43d3483722be669b92ae2b830
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?setw@std@@YA?AU?$_Smanip@H@1@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??0?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
?str@?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??_D?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?resize@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD0ABV?$allocator@D@1@@Z
??0?$basic_istringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@H@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV01@AAN@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??_D?$basic_istringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD0@Z
?swap@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXAAV12@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
mfc42
ord1988
ord690
ord5207
ord389
ord4129
ord5356
ord5807
ord5204
ord6426
ord6059
ord1601
ord539
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord1168
ord3337
ord1247
ord3953
ord6877
ord4277
ord5683
ord5448
ord350
ord3613
ord3126
ord5651
ord2071
ord1228
ord2818
ord941
ord1158
ord1105
ord533
ord5194
ord3318
ord1997
ord798
ord6383
ord5440
ord4202
ord5186
ord1979
ord536
ord926
ord1187
ord541
ord5861
ord4278
ord2764
ord6648
ord2614
ord940
ord6283
ord6282
ord2915
ord5572
ord2044
ord6394
ord5450
ord5834
ord2448
ord3663
ord823
ord538
ord860
ord924
ord537
ord939
ord858
ord922
ord535
ord801
ord800
ord354
ord540
ord665
ord1576
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
mbstowcs
wcsstr
toupper
strstr
memmove
_mbspbrk
_mbsinc
_mbschr
time
gmtime
srand
_except_handler3
calloc
??0exception@@QAE@ABQBD@Z
?what@exception@@UBEPBDXZ
strpbrk
_finite
modf
_ftol
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_snprintf
_setmbcp
_strrev
_itoa
strcat
exit
_iob
fprintf
sscanf
memcmp
rand
div
strcpy
strncpy
memset
sprintf
realloc
vprintf
_vsnprintf
_stricmp
_chsize
strlen
_purecall
__CxxFrameHandler
_EH_prolog
free
malloc
_CxxThrowException
_mbscmp
memcpy
kernel32
WriteFile
CreateFileA
GetFileSize
ReadFile
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
InterlockedExchangeAdd
MapViewOfFile
CreateFileMappingA
CreateEventA
ExitProcess
WaitForSingleObject
OpenFileMappingA
SetEvent
OpenEventA
Process32Next
Process32First
OpenMutexA
LocalAlloc
LocalFree
MoveFileA
SetFileTime
SetFilePointer
GetTempFileNameA
GetModuleFileNameA
GetTempPathA
GetSystemDirectoryA
GetTickCount
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLangID
GetLocaleInfoA
VirtualQuery
GetFileTime
GetCurrentThreadId
GetCurrentProcess
lstrcmpiA
GetCommandLineA
GetStartupInfoA
GetLocalTime
WriteProcessMemory
VirtualAllocEx
TerminateProcess
GetLastError
ResumeThread
SetThreadContext
GetModuleHandleA
ReadProcessMemory
GetThreadContext
VirtualAlloc
CreateProcessA
CreateRemoteThread
VirtualFreeEx
VirtualFree
SetFileAttributesA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
OpenProcess
GetCurrentProcessId
SystemTimeToFileTime
GetSystemTime
GetProcessTimes
Sleep
CreateMutexA
ExpandEnvironmentStringsA
UnmapViewOfFile
CreateToolhelp32Snapshot
user32
TranslateMessage
DispatchMessageA
GetMessageA
MessageBoxA
FindWindowA
advapi32
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
CryptReleaseContext
CryptDestroyHash
CryptDestroyKey
RegCreateKeyExA
GetUserNameA
RegDeleteValueA
RegCloseKey
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDecrypt
CryptSetKeyParam
CryptAcquireContextA
CryptImportKey
CryptEncrypt
shell32
ShellExecuteA
ole32
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
oleaut32
VariantClear
VariantInit
SafeArrayDestroy
SysFreeString
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
wsock32
inet_addr
ioctlsocket
htonl
shlwapi
PathFileExistsA
PathAppendA
ntdll
NtQuerySystemInformation
mpr
WNetGetProviderNameA
crypt32
CryptStringToBinaryA
CryptBinaryToStringA
CryptDecodeObjectEx
dnsapi
DnsRecordListFree
DnsQuery_A
iphlpapi
GetAdaptersAddresses
Sections
.text Size: 204KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ