Static task
static1
Behavioral task
behavioral1
Sample
d8eb06fe4542be0851b158eaaba3019ff630c7d063a74ecb43291a9fae1f3034.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8eb06fe4542be0851b158eaaba3019ff630c7d063a74ecb43291a9fae1f3034.exe
Resource
win10v2004-20220812-en
General
-
Target
d8eb06fe4542be0851b158eaaba3019ff630c7d063a74ecb43291a9fae1f3034
-
Size
684KB
-
MD5
03fffc7c0c97daf9a4601c3dec863780
-
SHA1
4b201d9767e90213e4645cd6c8a44b6085715bdf
-
SHA256
d8eb06fe4542be0851b158eaaba3019ff630c7d063a74ecb43291a9fae1f3034
-
SHA512
eddb076219314480e06422c695ec17d025be5d9ba9a3488f6578cf4c7df51957bd3f50bd07a5b557589ed8f8edfa10ac5ae2f240eca6f75b5f8a182ce1c56739
-
SSDEEP
12288:zeON2cExk7XtDTo9HEc62T2NTdOjcVCicas14oQOHMLAaOMJ0gJ2ic:zV22tDTEnNT2NBOjICLaoyO8Ap
Malware Config
Signatures
Files
-
d8eb06fe4542be0851b158eaaba3019ff630c7d063a74ecb43291a9fae1f3034.exe windows x86
285d430084961aaa803062c216828f82
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
connect
WSACleanup
WSACloseEvent
recv
send
accept
htonl
htons
WSAEventSelect
select
getsockname
WSAStartup
listen
bind
socket
WSASetEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSACreateEvent
WSAGetLastError
closesocket
ole32
OleInitialize
OleUninitialize
advapi32
EqualSid
CreateServiceA
DeleteService
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
QueryServiceStatus
StartServiceA
ControlService
CloseServiceHandle
RegDeleteValueA
SetServiceStatus
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenThreadToken
OpenProcessToken
GetTokenInformation
FreeSid
AllocateAndInitializeSid
msvcr71
isxdigit
iswctype
fread
sscanf
_strnicmp
_purecall
isdigit
strtod
isspace
getenv
_iob
_vsnprintf
setlocale
strftime
localtime
time
abort
_endthreadex
_beginthreadex
tolower
fgets
??1type_info@@UAE@XZ
__dllonexit
_onexit
__security_error_handler
_c_exit
_exit
_XcptFilter
_cexit
__p___initenv
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
_except_handler3
strcspn
sprintf
fclose
printf
_strtoui64
_strtoi64
strtol
??_U@YAPAXI@Z
localeconv
strtoul
fopen
_errno
strerror
??0bad_cast@@QAE@PBD@Z
??1bad_cast@@UAE@XZ
??0bad_cast@@QAE@ABV0@@Z
fprintf
free
??_V@YAXPAX@Z
memchr
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
_stat
memcpy
__crtLCMapStringA
__pctype_func
isupper
___lc_codepage_func
___lc_handle_func
_unlock
malloc
_lock
___setlc_active_func
___unguarded_readlc_active_add_func
islower
__uncaught_exception
exit
fflush
kernel32
GetTickCount
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
GlobalMemoryStatus
WaitForMultipleObjects
DeviceIoControl
UnmapViewOfFile
VirtualUnlock
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
VirtualLock
LoadLibraryExA
MapViewOfFile
CreateFileMappingA
Sleep
GetSystemTimeAsFileTime
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleHandleA
SetConsoleCtrlHandler
GetCurrentProcessId
OpenProcess
SetPriorityClass
CreateEventA
SetEvent
WaitForSingleObject
GetCurrentThread
WideCharToMultiByte
CreateFileA
GetLogicalDrives
QueryDosDeviceA
GetFullPathNameA
GetLongPathNameA
GetModuleFileNameA
GetThreadLocale
CloseHandle
SetErrorMode
GetVersionExA
GetSystemInfo
LoadLibraryA
GetLastError
GetCurrentProcess
GetProcAddress
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp1 Size: 540KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE