Static task
static1
Behavioral task
behavioral1
Sample
30d06e867ca78393c0a9e6fe8e9e46adab88642fedd86e8a6c4ab8298ad57b5a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
30d06e867ca78393c0a9e6fe8e9e46adab88642fedd86e8a6c4ab8298ad57b5a.exe
Resource
win10v2004-20220812-en
General
-
Target
30d06e867ca78393c0a9e6fe8e9e46adab88642fedd86e8a6c4ab8298ad57b5a
-
Size
152KB
-
MD5
09878b489842fb2d6fa68e3a4ef7f3f2
-
SHA1
b974da80f794bfabab5a23447a49acd37dd547b7
-
SHA256
30d06e867ca78393c0a9e6fe8e9e46adab88642fedd86e8a6c4ab8298ad57b5a
-
SHA512
29c237c0452a82def565556ede4ef32ad78842662de963271ca0324b17e9bdbee3e4732da8294702bb84d172cd544b04833c07bda714bbe86924c4b177437ba2
-
SSDEEP
3072:ufOE/KMrkF1rYnQ7OQiEw5h2t2lJboJuk:ICMYFRM3920bquk
Malware Config
Signatures
Files
-
30d06e867ca78393c0a9e6fe8e9e46adab88642fedd86e8a6c4ab8298ad57b5a.exe windows x86
fc42b13353edbc7729f88eacf2e619c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
VkKeyScanA
keybd_event
ShowWindow
SetFocus
OpenClipboard
BlockInput
SwitchToThisWindow
GetWindowTextA
EmptyClipboard
SetClipboardData
CloseClipboard
GetMenu
FindWindowA
IsWindow
SendMessageA
FindWindowExA
SetForegroundWindow
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
VariantClear
SysFreeString
GetErrorInfo
VariantInit
ws2_32
accept
inet_addr
htons
connect
__WSAFDIsSet
select
send
socket
closesocket
recv
listen
bind
ioctlsocket
setsockopt
WSAStartup
WSACleanup
kernel32
GlobalLock
LocalFree
lstrlenA
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetFilePointer
HeapSize
RaiseException
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
RtlUnwind
HeapAlloc
HeapReAlloc
HeapFree
CreatePipe
DuplicateHandle
PeekNamedPipe
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
ExitThread
Sleep
ExitProcess
CloseHandle
CreateProcessA
GetModuleFileNameA
GetSystemDirectoryA
DeleteFileA
OpenProcess
GetCurrentProcessId
GetLastError
CopyFileA
SetFileAttributesA
GetFileAttributesA
GetModuleHandleA
WaitForSingleObject
CreateMutexA
GetTickCount
GetTempPathA
TerminateThread
CreateThread
LoadLibraryA
GetProcAddress
GlobalUnlock
GlobalAlloc
GetWindowsDirectoryA
InterlockedDecrement
GetLocaleInfoA
GetVersionExA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
ReadFile
WriteFile
TransactNamedPipe
CreateFileA
GetLocalTime
FormatMessageA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
FreeLibrary
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 625KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE