Static task
static1
Behavioral task
behavioral1
Sample
478534144c943a62b043d3d74499e01d32efc573d18a875a911121f624c6ade1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
478534144c943a62b043d3d74499e01d32efc573d18a875a911121f624c6ade1.exe
Resource
win10v2004-20220812-en
General
-
Target
478534144c943a62b043d3d74499e01d32efc573d18a875a911121f624c6ade1
-
Size
77KB
-
MD5
1e6737503c3b8cde9facf1c9fa44a6aa
-
SHA1
5af9d2705a75c8aa59f32e9e66ef69bb66dbbfd3
-
SHA256
478534144c943a62b043d3d74499e01d32efc573d18a875a911121f624c6ade1
-
SHA512
7774510a692ca8e357b1a5d44705963c211b4bed8de01ca33788d0d9331dfb553fe18216fc319ce9be838e8c87ba704fba65fefa1ceacab530163b935ff8a8d6
-
SSDEEP
1536:J2Aw/6yx604K6kC8eICUDwvKokSRzzLqRUPs229vG9wG4cA:J2Aw/T804BkC8dmKFSRXL/0DKtvA
Malware Config
Signatures
Files
-
478534144c943a62b043d3d74499e01d32efc573d18a875a911121f624c6ade1.exe windows x86
466fc85a89982c0c50e8dc71c87068bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_strnicmp
strncmp
strncpy
_strdup
free
_stricmp
atof
_isnan
sprintf
memmove
strcmp
strlen
strcpy
strcat
memcpy
_CIatan
_CIpow
localtime
mktime
gmtime
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
WinExec
GetLogicalDrives
GetVolumeInformationA
GetDriveTypeA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
OpenProcess
GetSystemDefaultLCID
GetLocaleInfoA
GetComputerNameA
GlobalMemoryStatus
Sleep
EnterCriticalSection
WaitForSingleObject
LeaveCriticalSection
InitializeCriticalSection
CreateThread
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
HeapAlloc
CreateProcessA
HeapFree
GetCommandLineA
PeekNamedPipe
ReadFile
SetUnhandledExceptionFilter
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetTickCount
TlsGetValue
FreeLibrary
LoadLibraryA
GetProcAddress
GetTempPathA
CreateDirectoryA
SetFileAttributesA
FindFirstFileA
FindClose
GetFileAttributesA
DeleteFileA
CopyFileA
GetLastError
FindNextFileA
WriteFile
CreateFileA
GetFileSize
SetFilePointer
HeapReAlloc
GetLocalTime
GlobalAlloc
GlobalLock
GlobalUnlock
MultiByteToWideChar
WaitForMultipleObjects
GetCurrentThread
CreateSemaphoreA
ReleaseSemaphore
user32
EnumWindows
GetWindowTextA
GetSystemMetrics
CharLowerA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
SetServiceStatus
StartServiceCtrlDispatcherA
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
CreateServiceA
ChangeServiceConfig2A
RegisterServiceCtrlHandlerA
StartServiceA
ControlService
QueryServiceStatus
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteExA
wsock32
WSAStartup
socket
connect
send
recv
WSACleanup
gethostbyname
inet_ntoa
inet_addr
closesocket
winmm
timeBeginPeriod
timeEndPeriod
iphlpapi
SendARP
ole32
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
Sections
.code Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 181B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE