Static task
static1
Behavioral task
behavioral1
Sample
adb43bf2e9b8e9e99ff04ee2a3466d12b9bd31966c4eb9a5b2892b1eb9285a1d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
adb43bf2e9b8e9e99ff04ee2a3466d12b9bd31966c4eb9a5b2892b1eb9285a1d.exe
Resource
win10v2004-20220812-en
General
-
Target
adb43bf2e9b8e9e99ff04ee2a3466d12b9bd31966c4eb9a5b2892b1eb9285a1d
-
Size
17KB
-
MD5
81f88f796f1d66993e72823472e91c60
-
SHA1
4c082399d79cb1d78a5ebb67e1430fc3f8d2fa02
-
SHA256
adb43bf2e9b8e9e99ff04ee2a3466d12b9bd31966c4eb9a5b2892b1eb9285a1d
-
SHA512
d84d5a93a0bd414912d74866ca6113641456e7d43b1e76dd9a6e7d4f5fb524be63b1916d60a33a742ad14d7d000831c1e89c10270e1688aa3d3bb28c461d888c
-
SSDEEP
384:Gc5J6z2MgeOWdntbSEoujkBWd9/1qQDMi:n5J6iMgnWptb+6uW17
Malware Config
Signatures
Files
-
adb43bf2e9b8e9e99ff04ee2a3466d12b9bd31966c4eb9a5b2892b1eb9285a1d.exe windows x86
04878df1a2551301233faf545469f9d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
DeleteFileA
ReleaseMutex
OpenMutexA
CreateThread
GetLastError
CreateMutexA
SetPriorityClass
GetModuleFileNameA
GetStartupInfoA
ResumeThread
SetThreadPriority
GetCurrentThread
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
SetFileAttributesA
CreateProcessA
lstrcmpiA
GetModuleHandleA
SetErrorMode
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
TerminateProcess
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
ReadFile
GetFileSize
SetFilePointer
CreateFileA
GetCurrentProcess
CloseHandle
lstrcpyA
GetVersionExA
GlobalMemoryStatusEx
GetSystemDefaultUILanguage
LoadLibraryA
GetProcAddress
GetTickCount
FreeLibrary
GetWindowsDirectoryA
GetSystemDirectoryA
GlobalAlloc
GlobalFree
InterlockedExchange
OutputDebugStringA
Sleep
CopyFileA
user32
wsprintfA
advapi32
DeleteService
StartServiceA
RegOpenKeyA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
StartServiceCtrlDispatcherA
CreateServiceA
shell32
ShellExecuteA
msvcrt
_controlfp
_except_handler3
sprintf
??2@YAPAXI@Z
strstr
atoi
strncpy
strcspn
memmove
??3@YAXPAX@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
ws2_32
setsockopt
htons
WSAStartup
socket
recv
__WSAFDIsSet
select
connect
send
closesocket
inet_addr
WSACleanup
WSAIoctl
gethostbyname
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
shlwapi
SHDeleteKeyA
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE