Static task
static1
Behavioral task
behavioral1
Sample
4589037aac5db8bb84f5a2269f2345159e550f5aeb82c560e7f5a5f116690cd7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4589037aac5db8bb84f5a2269f2345159e550f5aeb82c560e7f5a5f116690cd7.exe
Resource
win10v2004-20220812-en
General
-
Target
4589037aac5db8bb84f5a2269f2345159e550f5aeb82c560e7f5a5f116690cd7
-
Size
140KB
-
MD5
930702a2a94b84af7be27aba52b2e180
-
SHA1
e96cc6320a9714516d45f4b1804985358fa17580
-
SHA256
4589037aac5db8bb84f5a2269f2345159e550f5aeb82c560e7f5a5f116690cd7
-
SHA512
173777d8011cdc2252130f40eab47ec29ef024698335ec7431207bbf396abef67454ea4b6b1252360cecb9becf61174149754b57d32676d193f8f1fa7d584588
-
SSDEEP
3072:U6rY2ikaS9NxgdcxF4lwEUi8TOWbhN1sZaLZ+:BirS9NxgdcxF60iGDVN1sZa9+
Malware Config
Signatures
Files
-
4589037aac5db8bb84f5a2269f2345159e550f5aeb82c560e7f5a5f116690cd7.exe windows x86
8b45b4e544604b9adec9f9a472499f6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetSystemDirectoryA
GetLocalTime
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTickCount
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
GetFileAttributesA
WaitForMultipleObjects
DeviceIoControl
OutputDebugStringA
GlobalMemoryStatus
GetSystemInfo
SetFileAttributesA
MoveFileExA
DefineDosDeviceA
OpenEventA
SetErrorMode
LocalSize
OpenProcess
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
GetLastError
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
DeleteFileA
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
FreeLibrary
MultiByteToWideChar
GetWindowsDirectoryA
lstrcatA
GetVersionExA
GetPrivateProfileSectionNamesA
lstrlenA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
ResetEvent
lstrcpyA
CancelIo
WaitForSingleObject
InterlockedExchange
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
TerminateThread
CloseHandle
CreateEventA
LoadLibraryA
WinExec
GetModuleFileNameA
SetLastError
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateDirectoryA
CreateProcessA
GetProcAddress
CreateThread
Sleep
ResumeThread
SetEvent
PeekNamedPipe
user32
OpenClipboard
GetClipboardData
GetSystemMetrics
LoadCursorA
DestroyCursor
ReleaseDC
GetDC
GetDesktopWindow
SetRect
EmptyClipboard
CloseClipboard
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
SetThreadDesktop
GetCursorPos
SetClipboardData
CloseWindow
CreateWindowExA
IsWindow
GetMessageA
SetCursorPos
WindowFromPoint
SetCapture
mouse_event
wsprintfA
MapVirtualKeyA
SendMessageA
BlockInput
GetForegroundWindow
EnumWindows
GetWindowTextA
GetCursorInfo
CharNextA
MessageBoxA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
gdi32
BitBlt
CreateDIBSection
GetDIBits
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
advapi32
ControlService
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
CloseServiceHandle
DeleteService
QueryServiceStatus
OpenServiceA
RegSetValueExA
RegCreateKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
LookupAccountSidA
GetTokenInformation
LsaOpenPolicy
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
msvcrt
_strnicmp
_strupr
__set_app_type
_strrev
_onexit
__dllonexit
_controlfp
_strcmpi
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
realloc
strncat
strtok
_snprintf
_errno
atoi
sprintf
strncmp
strncpy
strrchr
_except_handler3
free
malloc
strcat
strcmp
strchr
strcpy
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
ceil
_ftol
strlen
strstr
memmove
_CxxThrowException
memcmp
shlwapi
SHDeleteKeyA
winmm
waveInGetNumDevs
waveOutOpen
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutGetNumDevs
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveOutPrepareHeader
ws2_32
inet_addr
inet_ntoa
select
htons
setsockopt
ntohs
closesocket
send
WSAStartup
WSAIoctl
connect
gethostname
WSAGetLastError
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
socket
gethostbyname
bind
recv
getsockname
WSACleanup
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
wininet
InternetOpenA
InternetGetConnectedState
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
wtsapi32
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
userenv
CreateEnvironmentBlock
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ