Static task
static1
Behavioral task
behavioral1
Sample
2301677cfda5050ea7254c89f19a807053acc8bb6b0d720fdb5c33d48968398f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2301677cfda5050ea7254c89f19a807053acc8bb6b0d720fdb5c33d48968398f.exe
Resource
win10v2004-20220812-en
General
-
Target
2301677cfda5050ea7254c89f19a807053acc8bb6b0d720fdb5c33d48968398f
-
Size
160KB
-
MD5
b5f050c1c2b1ca632af00347039267ae
-
SHA1
378ddb34f7ce47ea48ae7ad1a555081c1c1b04f1
-
SHA256
2301677cfda5050ea7254c89f19a807053acc8bb6b0d720fdb5c33d48968398f
-
SHA512
3510f4212245b300de81b8b5662c00c2333dda9cc67a73e239bc1b9f2c15af8dce8a9cb8a402f955213a9e8b6f1af7d91ef979533ce768bf2a738e7003f88829
-
SSDEEP
3072:o7FxEnEXaq77+aJiXSLjoggRDUxRs1hbsm0gFF0W7w0uIsDdofYRxYv0sjuC3MV:ordKq77+Y22joggi41R30g70WE0uMKq0
Malware Config
Signatures
Files
-
2301677cfda5050ea7254c89f19a807053acc8bb6b0d720fdb5c33d48968398f.exe windows x86
736d58f9047a6ce651e1f58fbd902ada
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
ExitProcess
GetSystemDirectoryA
GetLocalTime
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTickCount
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WinExec
GetCurrentProcess
GetSystemInfo
OpenEventA
SetErrorMode
SetFileAttributesA
MoveFileExA
DefineDosDeviceA
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
CreateThread
SetLastError
GetModuleFileNameA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
LocalAlloc
RemoveDirectoryA
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
lstrcatA
GetVersionExA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
GetProcAddress
lstrlenA
CancelIo
InterlockedExchange
SetEvent
Sleep
lstrcpyA
FreeLibrary
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
WaitForMultipleObjects
user32
BlockInput
SendMessageA
SystemParametersInfoA
MapVirtualKeyA
mouse_event
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
LoadCursorA
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
IsWindow
wsprintfA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
CharNextA
SetRect
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
gdi32
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
SelectObject
advapi32
LsaOpenPolicy
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
DuplicateTokenEx
SetTokenInformation
AdjustTokenPrivileges
CreateProcessAsUserA
IsValidSid
LsaClose
LsaRetrievePrivateData
LsaFreeMemory
RegOpenKeyExA
RegCloseKey
RegQueryValueA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
_strnicmp
strtok
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
_strupr
_errno
strncpy
strncmp
atoi
strcat
rename
strrchr
_except_handler3
free
strcmp
malloc
strchr
strcpy
??2@YAPAXI@Z
memset
strstr
strlen
_ftol
ceil
memmove
_CxxThrowException
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
ws2_32
recvfrom
__WSAFDIsSet
gethostname
inet_ntoa
send
select
sendto
recv
WSAStartup
WSACleanup
WSAIoctl
htons
setsockopt
connect
listen
accept
getpeername
bind
getsockname
closesocket
inet_addr
ntohs
socket
gethostbyname
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
urlmon
URLDownloadToFileA
wtsapi32
WTSQuerySessionInformationA
WTSQueryUserToken
WTSFreeMemory
userenv
CreateEnvironmentBlock
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
msvfw32
ICSendMessage
ICSeqCompressFrameEnd
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ