Static task
static1
Behavioral task
behavioral1
Sample
dcd3cad0fea4babd761dbe475444361d41388352d82006321e025ff07ad4834c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dcd3cad0fea4babd761dbe475444361d41388352d82006321e025ff07ad4834c.exe
Resource
win10v2004-20220812-en
General
-
Target
dcd3cad0fea4babd761dbe475444361d41388352d82006321e025ff07ad4834c
-
Size
153KB
-
MD5
a290f996eaa4c062c38ec55ba71c52d0
-
SHA1
c605307a413164b44cb4474e158830093233634a
-
SHA256
dcd3cad0fea4babd761dbe475444361d41388352d82006321e025ff07ad4834c
-
SHA512
a4d097ee24cea61a956274d26923d01e39740cbb431ff05f07b5d8154a4ddbe25b06cb047d8859c9879fe737b37fa7bc22b35770a5e75ef892b0dc8eda6b2d5c
-
SSDEEP
3072:sT22yAkL0UdfBWEMt3szWvirAowJCbPJvbD567kHPRS:kkdfwGav6AowJwRvrY
Malware Config
Signatures
Files
-
dcd3cad0fea4babd761dbe475444361d41388352d82006321e025ff07ad4834c.exe windows x86
1af79d464e8887617e0a06b8a58e0964
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
recv
closesocket
WSAStartup
socket
WSACleanup
setsockopt
gethostbyname
inet_ntoa
inet_addr
htons
connect
send
gdi32
GdiGetBatchLimit
GetStockObject
GetMapMode
SetMapMode
LPtoDP
GetDeviceCaps
DPtoLP
CreateFontA
SelectObject
kernel32
GetStringTypeW
SetEndOfFile
GetStringTypeA
SetFileApisToANSI
LockResource
GetProcessWorkingSetSize
LocalAlloc
GetThreadSelectorEntry
MulDiv
CreateProcessA
GetModuleFileNameA
Process32Next
CloseHandle
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
CreateEventA
Sleep
GlobalFree
GlobalUnlock
GetProcessHeap
GlobalAlloc
ReadFile
GetFileSize
CreateFileA
GetModuleHandleA
GetTickCount
GetTempPathA
GetEnvironmentVariableA
CopyFileA
SetFileAttributesA
GetCommandLineA
SetEvent
CreateThread
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetTimeZoneInformation
MultiByteToWideChar
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalLock
CreateDirectoryA
GetCurrentDirectoryA
GetSystemTimeAsFileTime
GetLastError
HeapFree
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetModuleHandleW
GetProcAddress
ExitProcess
GetStartupInfoA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
SetHandleCount
GetFileType
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetFullPathNameA
user32
SetFocus
CreateIconFromResourceEx
MessageBoxA
LoadCursorA
RegisterClassExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
GetTitleBarInfo
GetDesktopWindow
GetWindowRect
MoveWindow
CreateWindowExA
BeginPaint
EndPaint
DefWindowProcA
GetWindowDC
InvalidateRect
UpdateWindow
SetWindowTextA
DrawEdge
advapi32
RegSetValueExA
RegCloseKey
LogonUserExA
RegOpenKeyA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE