Static task
static1
Behavioral task
behavioral1
Sample
80ed63c1689553c81e38fd356f13a58af9447922d786099007c7e9e3682d792d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80ed63c1689553c81e38fd356f13a58af9447922d786099007c7e9e3682d792d.exe
Resource
win10v2004-20220812-en
General
-
Target
80ed63c1689553c81e38fd356f13a58af9447922d786099007c7e9e3682d792d
-
Size
140KB
-
MD5
84d51a52bc9b65f956638e8484e925f9
-
SHA1
0637c610d7075bda314874c15e9a0dc4958ee198
-
SHA256
80ed63c1689553c81e38fd356f13a58af9447922d786099007c7e9e3682d792d
-
SHA512
a3b9adc894c4c87e03c394da5aafc409c27b27d85abae32e086083077c1e34e6f73c3ee86bb1498ff603dc5d6f368107ded0b50f449278f82c976130a95dd25a
-
SSDEEP
3072:Yf3Rgsw3vkOZmdzttHZTWqdE/pUjxX4SDADeak7dJHB/A9:YMcOZmXtHZTWq5jxoSsQLH5A9
Malware Config
Signatures
Files
-
80ed63c1689553c81e38fd356f13a58af9447922d786099007c7e9e3682d792d.exe windows x86
0db959ec476d10f3ab5dc6c0be4698ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
explainscr
?GetValidItemCount@CExplainScrView@@QAEHXZ
??0CExplainScrDoc@@IAE@XZ
??1CExplainScrDoc@@UAE@XZ
?OnObjChange@CExplainScrView@@UAEXPBD0I@Z
?AddStringToListBox@CExplainScrView@@UAEXPBDPAVCCheckListBox@@@Z
?OnDraw@CExplainScrView@@MAEXPAVCDC@@@Z
?PreTranslateMessage@CExplainScrView@@UAEHPAUtagMSG@@@Z
??1CExplainScrView@@UAE@XZ
??0CExplainScrView@@IAE@XZ
?GetControlByName@CExplainScrView@@QAEPAVCWnd@@PBD@Z
?WriteConditionFile@CExplainScrView@@QAEXPBD@Z
??0CExplainScrApp@@QAE@XZ
?OnInitialUpdate@CExplainScrView@@MAEXXZ
?OnCommand@CExplainScrView@@MAEHIJ@Z
??1CESMainFrame@@UAE@XZ
??0CESMainFrame@@IAE@XZ
mfc42
ord2396
ord3346
ord5300
ord5302
ord5199
ord1089
ord4079
ord5307
ord5289
ord5714
ord2982
ord3147
ord4698
ord4465
ord3259
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord3136
ord815
ord1768
ord825
ord800
ord1200
ord2763
ord860
ord540
ord617
ord5214
ord296
ord986
ord520
ord823
ord4159
ord6117
ord2621
ord1134
ord5265
ord4376
ord4853
ord4998
ord4710
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord6215
ord5163
ord6374
ord4353
ord5280
ord2385
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord641
ord4234
ord6282
ord858
ord4278
ord4129
ord537
ord2725
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4420
ord4953
ord4858
ord2399
ord4387
ord3454
ord3198
ord6080
ord6175
ord4623
ord4426
ord4823
ord4614
ord4613
ord1841
ord3798
ord4644
ord1771
ord6366
ord2413
ord2024
ord4217
ord2576
ord6055
ord4397
ord2512
ord3922
ord3577
ord4589
ord5076
ord4340
ord4347
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord1776
ord5240
ord3748
ord1725
ord2091
ord4432
ord1168
ord567
ord692
ord5260
ord2535
ord2642
ord2764
ord3317
ord2652
ord1669
ord4486
ord4224
ord2818
ord6199
ord6069
ord6067
ord1175
ord2859
ord3874
ord603
ord1979
ord1969
ord6404
ord273
ord665
ord353
ord4508
ord2864
ord354
ord5186
ord5651
ord3127
ord3616
ord350
ord3663
ord2614
ord4277
ord5461
ord1842
ord4242
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord4427
ord807
ord796
ord384
ord554
ord529
ord686
ord6000
ord2117
ord2863
ord4457
ord5252
ord2820
ord3811
ord640
ord2450
ord940
ord1640
ord323
ord3797
ord4499
ord4220
ord2584
ord3654
ord2438
ord6270
ord6605
ord2012
ord1644
ord1146
ord4413
ord5030
ord6375
ord4274
ord4610
ord4612
ord4615
ord5731
ord5290
ord2554
ord3352
ord4241
ord6283
ord1576
msvcrt
free
strncpy
malloc
atof
atoi
localtime
time
_tell
_lseek
printf
_open
_read
mktime
_close
asctime
fscanf
calloc
exit
fprintf
memchr
memmove
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
strchr
toupper
fopen
fclose
fgets
_mbscmp
strncmp
_sopen
_locking
_write
_setmbcp
sprintf
_cwait
_spawnl
__CxxFrameHandler
_findfirst
kernel32
DeleteFileA
GetModuleHandleA
GetStartupInfoA
GetPrivateProfileStringA
user32
GetMenu
GetSystemMetrics
MessageBoxA
EnableMenuItem
DeleteMenu
SetMenu
GetWindowRect
KillTimer
EnableWindow
LoadMenuA
GetSystemMenu
SetActiveWindow
SetTimer
BringWindowToTop
SendMessageA
GetDC
ReleaseDC
SystemParametersInfoA
OffsetRect
GetSubMenu
UpdateWindow
gdi32
GetTextExtentPoint32A
SelectObject
CreateFontIndirectA
GetTextMetricsA
wsock32
gethostname
gethostbyname
inet_addr
WSAStartup
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ