Static task
static1
Behavioral task
behavioral1
Sample
310906e8e67017c1420f4f12d606b2e86d8203429f2ad8880dc7a786def64eef_unpacked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
310906e8e67017c1420f4f12d606b2e86d8203429f2ad8880dc7a786def64eef_unpacked.exe
Resource
win10v2004-20220901-en
General
-
Target
310906e8e67017c1420f4f12d606b2e86d8203429f2ad8880dc7a786def64eef_unpacked
-
Size
25KB
-
MD5
85658b4e716c8f2ad8f59ffc35e840f2
-
SHA1
10273c305f97e66e1879e57d1b8a48920de82abf
-
SHA256
66ac84c6cb68cdee499b03fea4931c0bc5ebd72a8df221972764f2b9f5fd3ece
-
SHA512
03d11a4030900b5dd6b6c29e43caa0312210a81799cac3f9aeac5802a758a9ddb1cbca81f56d542dedb32371428c4e742563aac16a72aa8649b6fa3233132a6f
-
SSDEEP
768:V/TxciDNYxm+lKksfFrT3pnVLU96bOptW/r:hVck0llKV9vpVLi6CW/
Malware Config
Signatures
Files
-
310906e8e67017c1420f4f12d606b2e86d8203429f2ad8880dc7a786def64eef_unpacked.exe windows x86
aa49f3cf7822c0bacd44bef086114d82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??3@YAXPAX@Z
??1type_info@@UAE@XZ
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
strstr
exit
_XcptFilter
_exit
atoi
rand
malloc
sprintf
strtok
strncpy
strchr
strncmp
memmove
srand
_snprintf
_CxxThrowException
memset
ws2_32
recv
WSACleanup
closesocket
socket
connect
gethostbyname
inet_addr
ioctlsocket
select
WSAStartup
send
htons
shlwapi
PathFileExistsA
urlmon
URLDownloadToFileA
kernel32
WriteFile
WaitForSingleObject
CreateMutexA
GetModuleFileNameA
SetFileAttributesA
CopyFileA
GetLastError
CreateDirectoryA
ExpandEnvironmentStringsA
GetLocaleInfoA
ExitProcess
lstrcpyW
GlobalUnlock
lstrlenW
Sleep
GlobalAlloc
GlobalLock
MultiByteToWideChar
GetTickCount
GetSystemDefaultLangID
GetTempPathA
ExitThread
CloseHandle
GetVersionExA
CreateThread
lstrlenA
GetFileAttributesA
LocalFree
GetStartupInfoA
FindNextFileA
FindClose
GetLogicalDriveStringsA
FindFirstFileA
lstrcatA
GetSystemDirectoryA
CreateFileA
DeviceIoControl
GetModuleHandleA
GetDriveTypeA
user32
ShowWindow
BlockInput
EmptyClipboard
SetFocus
OpenClipboard
VkKeyScanA
keybd_event
CharLowerBuffA
SetForegroundWindow
SetClipboardData
wsprintfA
CloseClipboard
wsprintfW
advapi32
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
shell32
ShellExecuteA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantInit
VariantClear
SysAllocString
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ