Static task
static1
Behavioral task
behavioral1
Sample
64ec41992abe2c22f7cd78bf45ddbaaa86edb41b3e00fbc836c026e636edab51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64ec41992abe2c22f7cd78bf45ddbaaa86edb41b3e00fbc836c026e636edab51.exe
Resource
win10v2004-20220812-en
General
-
Target
64ec41992abe2c22f7cd78bf45ddbaaa86edb41b3e00fbc836c026e636edab51
-
Size
146KB
-
MD5
3e3d76070621eef54e4aa18d3e7b91a0
-
SHA1
7c4c3baaaa37366365ef30dea33d40ec330d84eb
-
SHA256
64ec41992abe2c22f7cd78bf45ddbaaa86edb41b3e00fbc836c026e636edab51
-
SHA512
cb597dadfc90141a36b0ec5df884f214ca2ef738ebedda36499e96d79a7d08d24780f62199e496b7ed86bfbdb09ddf136587003209fdbf41a03d1060b3195904
-
SSDEEP
3072:IOnyyA2iB7am17G5giG6lw+0FOP19mgXUYUYUYof9KYYBiiiiiiiiiiiiii:IOnyT2iB7amApG+FSOP19mgXiiiiiiiC
Malware Config
Signatures
Files
-
64ec41992abe2c22f7cd78bf45ddbaaa86edb41b3e00fbc836c026e636edab51.exe windows x86
44f76c8952af2078aa92d9db94bfdda9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetSystemInfo
GetVersionExA
GetTickCount
CopyFileA
CreateToolhelp32Snapshot
GetLocalTime
lstrcmpA
ExitProcess
OpenProcess
LocalSize
GetStartupInfoA
GetModuleHandleA
Process32First
Process32Next
TerminateThread
InitializeCriticalSection
CreateThread
GetCurrentProcess
WinExec
CreateProcessA
GetLastError
GlobalSize
DeleteFileA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
Sleep
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
DeleteCriticalSection
EnterCriticalSection
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrcatA
GetProcessHeap
HeapFree
GetModuleFileNameA
GetWindowsDirectoryA
LeaveCriticalSection
VirtualAlloc
VirtualFree
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
user32
GetClipboardData
GetSystemMetrics
LoadCursorA
DestroyCursor
ReleaseDC
GetDC
GetDesktopWindow
OpenClipboard
SetClipboardData
GetCursorInfo
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
SetThreadDesktop
SetRect
EmptyClipboard
CloseWindow
CreateWindowExA
IsWindow
wsprintfA
MessageBoxA
CloseClipboard
SetCursorPos
WindowFromPoint
SetCapture
mouse_event
MapVirtualKeyA
SendMessageA
BlockInput
EnumWindows
GetWindowTextA
GetCursorPos
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
gdi32
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
RegCreateKeyExA
RegCloseKey
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegOpenKeyA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
CreateServiceA
LookupAccountSidA
GetTokenInformation
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ShellExecuteA
msvcrt
_strnicmp
_strupr
_XcptFilter
_strrev
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_strcmpi
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
exit
rand
realloc
strncat
strtok
strchr
_snprintf
_errno
atoi
strncmp
strrchr
strncpy
strcat
strcpy
sprintf
__CxxFrameHandler
_CxxThrowException
memcpy
ceil
_ftol
strlen
strstr
memmove
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
free
malloc
_except_handler3
strcmp
shlwapi
SHDeleteKeyA
ws2_32
accept
getpeername
listen
sendto
recvfrom
gethostname
WSAGetLastError
bind
getsockname
inet_addr
send
select
closesocket
recv
ntohs
WSAStartup
WSACleanup
WSAIoctl
setsockopt
ioctlsocket
__WSAFDIsSet
socket
gethostbyname
htons
connect
inet_ntoa
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetGetConnectedState
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICCompressorFree
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
wtsapi32
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
userenv
CreateEnvironmentBlock
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ