Static task
static1
Behavioral task
behavioral1
Sample
787f585f5c18f52f6e16c08d3fd3bd5bdf4fdd27bcb9e1913557ec83cf9a880e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
787f585f5c18f52f6e16c08d3fd3bd5bdf4fdd27bcb9e1913557ec83cf9a880e.exe
Resource
win10v2004-20220901-en
General
-
Target
787f585f5c18f52f6e16c08d3fd3bd5bdf4fdd27bcb9e1913557ec83cf9a880e
-
Size
60KB
-
MD5
0ebd8e8bcc9492127137ea9dab1cc7f0
-
SHA1
46ad5630a3d3e2897834cc8a3cc92de6fa876397
-
SHA256
787f585f5c18f52f6e16c08d3fd3bd5bdf4fdd27bcb9e1913557ec83cf9a880e
-
SHA512
3db96a5c27fa20412de102dfce53e5d8f3940356fdd6bb03ed1b69df2a3b8cbb53c11786d69465e70f846ce2797c7cf2bfbd36e454b0fe3fe3292492c17c1733
-
SSDEEP
1536:IZInLR+ubyOfaUAYkshGlG4tQbKH7USgcTl91S:QILR+uTaUAYksYlG4tQ2UcTl91S
Malware Config
Signatures
Files
-
787f585f5c18f52f6e16c08d3fd3bd5bdf4fdd27bcb9e1913557ec83cf9a880e.exe windows x86
c5a880a3cc7217347bb88b6a5eec29eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2818
ord354
ord665
ord5186
ord1979
ord6385
ord858
ord6059
ord3229
ord860
ord5204
ord5808
ord540
ord5353
ord533
ord825
ord5194
ord798
ord2915
ord6392
ord823
ord389
ord537
ord4204
ord535
ord800
msvcrt
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
printf
exit
srand
rand
strncat
_mbsstr
malloc
free
calloc
_mbscmp
atol
_XcptFilter
strncpy
_strlwr
time
sprintf
_itoa
_acmdln
__getmainargs
_initterm
_except_handler3
__CxxFrameHandler
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
strrchr
_controlfp
_stricmp
kernel32
GetPrivateProfileIntA
DeleteCriticalSection
CreateDirectoryA
GetModuleFileNameA
GetLastError
CreateEventA
GetPrivateProfileStringA
SetFilePointer
InitializeCriticalSection
GetCurrentDirectoryA
LocalFileTimeToFileTime
GetFileAttributesA
SetFileTime
WriteFile
GetTickCount
DeleteFileA
CreateProcessA
Sleep
GetTempPathA
GetSystemDirectoryA
CreateFileA
GetFileInformationByHandle
ReadFile
SystemTimeToFileTime
GetStartupInfoA
GetModuleHandleA
SetCurrentDirectoryA
GlobalAlloc
CloseHandle
user32
wsprintfA
PostMessageA
advapi32
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
shell32
SHGetSpecialFolderPathA
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
iphlpapi
GetAdaptersInfo
wininet
InternetCrackUrlA
ws2_32
inet_ntoa
inet_addr
htonl
WSAStartup
WSACleanup
socket
closesocket
connect
gethostbyname
ntohl
select
ioctlsocket
bind
setsockopt
listen
accept
send
recv
gethostname
gethostbyaddr
getpeername
recvfrom
__WSAFDIsSet
sendto
ntohs
htons
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE