Static task
static1
Behavioral task
behavioral1
Sample
02d49430ebca167eb006f403661ba60d6ead606d81d2c6d84cba281c4c482c81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02d49430ebca167eb006f403661ba60d6ead606d81d2c6d84cba281c4c482c81.exe
Resource
win10v2004-20220812-en
General
-
Target
02d49430ebca167eb006f403661ba60d6ead606d81d2c6d84cba281c4c482c81
-
Size
29KB
-
MD5
0e54ef77e5b2a8fb71642c79e4ca5fb0
-
SHA1
d2b47d8fa084a3ac977515d653eff1419e1fbd7b
-
SHA256
02d49430ebca167eb006f403661ba60d6ead606d81d2c6d84cba281c4c482c81
-
SHA512
c4c1480da10ad201b22b68502f6dc3690359c31941c5e8a7be39b012f4d6009f432225f3954edb1fe19b9d7d7a59eb951856e9d1b560731e57b0b0663dc4c347
-
SSDEEP
768:nrM/SbpgHPxZQC+Chvm4j7iFU0kgF1p4wmt/:nrMK8fQ/gjSU0kgF1pnY
Malware Config
Signatures
Files
-
02d49430ebca167eb006f403661ba60d6ead606d81d2c6d84cba281c4c482c81.exe windows x86
8614892d3f5595ad013589d05c71d64a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostbyname
WSAStartup
connect
socket
htons
send
sendto
inet_addr
WSACleanup
ioctlsocket
closesocket
recv
select
urlmon
URLDownloadToFileA
kernel32
LocalFree
GetStartupInfoA
GetDriveTypeA
lstrcatA
CreateDirectoryA
CreateFileA
WriteFile
lstrlenA
Process32Next
TerminateProcess
Process32First
CreateToolhelp32Snapshot
CloseHandle
ReadProcessMemory
OpenProcess
Module32Next
DeleteFileA
Sleep
SetFileAttributesA
Module32First
GetModuleFileNameA
GetModuleHandleA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualAlloc
CreateProcessA
ExpandEnvironmentStringsA
GetLastError
CopyFileA
GetFileAttributesA
lstrcmpiA
GetWindowsDirectoryA
CreateThread
ExitProcess
GetLocaleInfoA
GetTempPathA
GetTickCount
ExitThread
GetSystemDefaultLangID
GlobalUnlock
GlobalLock
GlobalAlloc
CreateMutexA
SetErrorMode
GetCurrentProcess
GetProcAddress
GetVersionExA
TerminateThread
WaitForSingleObject
GetLogicalDriveStringsA
shell32
ShellExecuteA
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
user32
VkKeyScanA
FindWindowA
wsprintfA
SetClipboardData
EmptyClipboard
OpenClipboard
keybd_event
ShowWindow
SetFocus
SetForegroundWindow
BlockInput
IsWindow
SendMessageA
MessageBoxA
CloseClipboard
msvcrt
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
??1type_info@@UAE@XZ
__p__commode
_acmdln
exit
__p__fmode
__set_app_type
_except_handler3
_CxxThrowException
??3@YAXPAX@Z
_XcptFilter
_exit
fclose
malloc
_ftol
strncat
srand
strtok
atoi
strchr
strncmp
memmove
strncpy
strlen
_snprintf
fprintf
fopen
sprintf
strstr
memset
strcat
strcmp
getchar
memcpy
rand
strcpy
_controlfp
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SysAllocString
VariantInit
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ