Static task
static1
Behavioral task
behavioral1
Sample
0f431e4f0fe12444bed59c764e1cb7aae5d00da5b1c28237ef88f64f888afc3b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f431e4f0fe12444bed59c764e1cb7aae5d00da5b1c28237ef88f64f888afc3b.exe
Resource
win10v2004-20220812-en
General
-
Target
0f431e4f0fe12444bed59c764e1cb7aae5d00da5b1c28237ef88f64f888afc3b
-
Size
289KB
-
MD5
0969a9d9867b5a501c3f602936b9cb9f
-
SHA1
e3b950070d803573460802314cb8c277052cecdf
-
SHA256
0f431e4f0fe12444bed59c764e1cb7aae5d00da5b1c28237ef88f64f888afc3b
-
SHA512
eb04d85b3fa061ffd99991f6543bddb61d4fa3f2b72d4dc0caf27631d21b6937406b70b69c497d5d44e4db9625f416c5138f1e3a3478e3806808a1775c85d0db
-
SSDEEP
6144:YCS+gEu4mKaFRml3blt5NhUIVPi++peLjJC9BF6GP8:YCbm4mKaFRyZlhUED+peLjm8
Malware Config
Signatures
Files
-
0f431e4f0fe12444bed59c764e1cb7aae5d00da5b1c28237ef88f64f888afc3b.exe windows x86
98b99fccbadfadc8bda168a2ecc4af46
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_addr
htons
connect
WSACleanup
WSAStartup
socket
setsockopt
ioctlsocket
bind
listen
send
select
__WSAFDIsSet
accept
recv
closesocket
kernel32
CopyFileA
GetComputerNameA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
SetEndOfFile
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetLastError
Sleep
CreateThread
GetModuleFileNameA
ExitThread
LeaveCriticalSection
EnterCriticalSection
GetTickCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLocalTime
CloseHandle
WriteFile
CreateFileA
ReadFile
SetFilePointer
GetFileSize
GetSystemDirectoryA
MultiByteToWideChar
TransactNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
ExitProcess
CreateProcessA
FindClose
FindNextFileA
FindFirstFileA
FreeLibrary
GetEnvironmentVariableW
GetProcAddress
LoadLibraryA
HeapFree
HeapAlloc
GetProcessHeap
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
OpenProcess
GetTimeFormatA
GetDateFormatA
GetFileAttributesA
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
SetFileAttributesA
GetTempPathA
WideCharToMultiByte
RtlUnwind
DebugBreak
GetCurrentProcess
TerminateProcess
lstrcmpiA
DeleteFileA
GetCurrentProcessId
WaitForSingleObject
CreateMutexA
TerminateThread
MoveFileA
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
CreatePipe
SetConsoleCtrlHandler
GetLocaleInfoA
GetVersionExA
GetLogicalDrives
WaitForMultipleObjects
GenerateConsoleCtrlEvent
GlobalMemoryStatus
IsBadWritePtr
IsBadReadPtr
HeapValidate
InterlockedDecrement
InterlockedIncrement
GetStartupInfoA
GetCommandLineA
GetVersion
FatalAppExitA
GetStdHandle
OutputDebugStringA
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
LCMapStringW
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
Sections
.text Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 667KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ