Static task
static1
Behavioral task
behavioral1
Sample
720d99f4e52fa70ea0e6e08adb2c763a2a429b331b1fe8bd7959ce7c01d3079d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
720d99f4e52fa70ea0e6e08adb2c763a2a429b331b1fe8bd7959ce7c01d3079d.exe
Resource
win10v2004-20220812-en
General
-
Target
720d99f4e52fa70ea0e6e08adb2c763a2a429b331b1fe8bd7959ce7c01d3079d
-
Size
58KB
-
MD5
08f56418c5f29b8d9e26fabb7f7b5ea5
-
SHA1
8fba4a0ad70bc9bc640a3a02984e5a131f946560
-
SHA256
720d99f4e52fa70ea0e6e08adb2c763a2a429b331b1fe8bd7959ce7c01d3079d
-
SHA512
acccf8eb374fc83de6cfc050b849edb9abe44168b9468895eacb7709ece37199ac4f6ad237c8d1269bbd6214e73a6913c836f429c9ea2f8737171efd1aa114ab
-
SSDEEP
1536:oKZBjPT3IzdKPjnvcGc34ApCBAciv4oVJo5:oKZBjr3IJKPxcIAuEvk
Malware Config
Signatures
Files
-
720d99f4e52fa70ea0e6e08adb2c763a2a429b331b1fe8bd7959ce7c01d3079d.exe windows x86
8cac96481a8206cbe930e75adbccfcf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp60
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
user32
BringWindowToTop
ShowWindow
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
BlockInput
wsprintfA
CharLowerA
FindWindowExA
SendMessageA
IsWindow
FindWindowA
SetForegroundWindow
SetFocus
VkKeyScanA
keybd_event
GetWindowTextA
GetMenu
EnumWindows
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
VariantClear
SysAllocString
VariantInit
kernel32
GlobalLock
GlobalUnlock
GlobalAlloc
GetLocaleInfoA
CreateMutexA
GetStartupInfoA
InterlockedDecrement
CopyFileA
CreateDirectoryA
GetVersionExA
FindClose
MultiByteToWideChar
GetWindowsDirectoryA
GetFileAttributesA
GetLogicalDriveStringsA
SetFileAttributesA
TerminateThread
GetDriveTypeA
FindFirstFileA
SetCurrentDirectoryA
GetFullPathNameA
lstrcatA
FindNextFileA
ReleaseMutex
GetFileSize
SetFilePointer
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GlobalFree
lstrlenA
lstrcpyA
lstrcmpA
ExitThread
Sleep
GetTempPathA
ExitProcess
GetLastError
CreateThread
lstrcmpiA
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObject
CreateProcessA
CloseHandle
WriteFile
CreateFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
lstrcpynA
msvcrt
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
strncat
fopen
fread
strtok
_snprintf
toupper
strncpy
strstr
strlen
strcpy
rand
strcmp
sprintf
system
strchr
atoi
__CxxFrameHandler
_EH_prolog
srand
memset
memcpy
strcat
free
malloc
memcmp
_vsnprintf
??2@YAPAXI@Z
_strdup
getenv
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
ws2_32
socket
sendto
htons
closesocket
setsockopt
WSACleanup
WSASocketA
WSAStartup
connect
ioctlsocket
urlmon
URLDownloadToFileA
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE