Static task
static1
Behavioral task
behavioral1
Sample
1d17167080da8029ae499bec3afd135cc4e1802e5125e594901fb9e40fc7797f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1d17167080da8029ae499bec3afd135cc4e1802e5125e594901fb9e40fc7797f.exe
Resource
win10v2004-20220812-en
General
-
Target
1d17167080da8029ae499bec3afd135cc4e1802e5125e594901fb9e40fc7797f
-
Size
152KB
-
MD5
4c83b49dcb8da2787d53b3b8d86a1f20
-
SHA1
8fc0c6523d486e9a1388866c56ba6a462683e709
-
SHA256
1d17167080da8029ae499bec3afd135cc4e1802e5125e594901fb9e40fc7797f
-
SHA512
28785708b54a6d5c1f6fac1a706561d4d2f16a2e87ef25b814bd4bae567ad1f981a9d5f3eb81d7e91b1050e2e9a5cfd11299417284cec38a9443c325ea621e6f
-
SSDEEP
3072:UJgtuPacaK7bYokUji5gCsAJGfzY/shLzGczUIxHAcfBOa:WroK780ji5g6CzuqLqczUIxnBT
Malware Config
Signatures
Files
-
1d17167080da8029ae499bec3afd135cc4e1802e5125e594901fb9e40fc7797f.exe windows x86
905ef5b4204c3f795d4e6c739c30b9a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
GetLocalTime
MoveFileA
ExitProcess
CreateProcessA
GetProcAddress
SetFilePointer
ReadFile
Sleep
WriteFile
RemoveDirectoryA
LocalAlloc
LocalFree
GetDriveTypeA
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
GetStartupInfoA
SetErrorMode
ReleaseMutex
GlobalUnlock
FreeLibrary
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
CloseHandle
LoadLibraryA
GlobalFree
user32
GetForegroundWindow
GetAsyncKeyState
GetKeyState
SetCapture
GetMessageA
GetWindowTextA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
LoadCursorA
SetCursorPos
CharNextA
TranslateMessage
DispatchMessageA
IsWindow
WindowFromPoint
SendMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
SetRect
ReleaseDC
gdi32
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
advapi32
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
msvcrt
_acmdln
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
_errno
atoi
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
_CxxThrowException
ceil
_ftol
strstr
strchr
malloc
free
_except_handler3
strrchr
rename
strncmp
ws2_32
WSAStartup
sendto
recvfrom
__WSAFDIsSet
gethostname
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
ntohs
closesocket
socket
gethostbyname
htons
connect
setsockopt
WSACleanup
select
msvcp60
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ujyhkuy Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ