Static task
static1
Behavioral task
behavioral1
Sample
45be52d3d8d72b24d62004877606a5791b1af4f736802a2f3a858360cb384124.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45be52d3d8d72b24d62004877606a5791b1af4f736802a2f3a858360cb384124.exe
Resource
win10v2004-20220812-en
General
-
Target
45be52d3d8d72b24d62004877606a5791b1af4f736802a2f3a858360cb384124
-
Size
224KB
-
MD5
a307b03df24353ad35570d70984ad230
-
SHA1
209bdfe74b5d2faac11210783fbb63d935e76d6a
-
SHA256
45be52d3d8d72b24d62004877606a5791b1af4f736802a2f3a858360cb384124
-
SHA512
f102efd61202e6c206c9de0f30ae138f3f1cce3e2d7362ed3f469842170f03032cb6c128054a32d6873a651633e543678c6db4f01a282e72295d4f48f0cf3d8a
-
SSDEEP
3072:WMn2zaFkNCZSSkPCbVqbY7fcgoL5JltLHXVrQGQ4Z:Nn2Hw0Pk3fcgoLRtbXV
Malware Config
Signatures
Files
-
45be52d3d8d72b24d62004877606a5791b1af4f736802a2f3a858360cb384124.exe windows x86
9cc71693ae61db7afdf88eefc7e43179
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord825
msvcrt
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__CxxFrameHandler
_CxxThrowException
memmove
_ftol
malloc
_except_handler3
realloc
free
strstr
exit
atoi
rand
sprintf
strncmp
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__p__commode
_adjust_fdiv
__setusermatherr
kernel32
GetModuleFileNameA
CreateToolhelp32Snapshot
MoveFileExA
GetStartupInfoA
FreeLibrary
Process32First
Process32Next
lstrcmpiA
GetProcAddress
LoadLibraryA
Sleep
CreateEventA
WaitForSingleObject
ResetEvent
InterlockedExchange
CancelIo
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
VirtualAlloc
GetFileAttributesA
CreateProcessA
lstrlenA
lstrcpyA
TerminateThread
lstrcatA
GetTickCount
DeleteFileA
GetLastError
HeapAlloc
GetProcessHeap
GetModuleHandleA
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
OpenEventA
CreateMutexA
ExitProcess
CreateThread
GetCurrentThreadId
user32
SetThreadDesktop
CloseDesktop
LoadIconA
LoadCursorA
RegisterClassA
PostThreadMessageA
GetInputState
GetMessageA
ShowWindow
GetWindow
FindWindowA
FindWindowExA
SendMessageA
GetDlgCtrlID
PostMessageA
SendInput
wsprintfA
GetUserObjectInformationA
GetThreadDesktop
OpenInputDesktop
OpenDesktopA
gdi32
GetStockObject
advapi32
DuplicateTokenEx
OpenEventLogA
CloseEventLog
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
OpenServiceA
StartServiceA
CloseServiceHandle
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegCreateKeyExA
RegSetValueExA
AdjustTokenPrivileges
SetTokenInformation
CreateProcessAsUserA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
ClearEventLogA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ws2_32
connect
htons
gethostbyname
socket
closesocket
setsockopt
WSACleanup
gethostname
getsockname
WSAStartup
send
recv
select
iphlpapi
GetIfTable
wininet
InternetCloseHandle
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ