Static task
static1
Behavioral task
behavioral1
Sample
f9ae6e885857407d03064d44c06508c310bdddf19f9c46d73293ad857bc507bd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f9ae6e885857407d03064d44c06508c310bdddf19f9c46d73293ad857bc507bd.exe
Resource
win10v2004-20220901-en
General
-
Target
f9ae6e885857407d03064d44c06508c310bdddf19f9c46d73293ad857bc507bd
-
Size
284KB
-
MD5
046d67e2a76bebf1d708fbd5f278f8c0
-
SHA1
4e9e240dc366d13a144ddf10f08d7dac7ad9d4f4
-
SHA256
f9ae6e885857407d03064d44c06508c310bdddf19f9c46d73293ad857bc507bd
-
SHA512
9dad48849aa016e566fbba92f0fbdd7c5db20fde635c8eb2be1a7be66acd91e2e6df042850cf591954fc57fa39ad84029494ecdd091ace51691e84976ebb5913
-
SSDEEP
6144:pJhXzYgcYMQG9u2MKAmYJ4IAE+frUH9Vz2lJJFjMPH5RMnJx:9DYzYM1Q21AmY/AE+zUalJJF8H
Malware Config
Signatures
Files
-
f9ae6e885857407d03064d44c06508c310bdddf19f9c46d73293ad857bc507bd.exe windows x86
be5f482e54939465bfa535cd6786394e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_strupr
_beginthreadex
memcpy
calloc
_CIacos
printf
_CIpow
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_access
putchar
wcscpy
strncat
strcat
vsprintf
exit
fopen
fwrite
fclose
strrchr
_except_handler3
free
strcmp
strcpy
malloc
memcmp
__CxxFrameHandler
??2@YAPAXI@Z
??1type_info@@UAE@XZ
_CxxThrowException
atoi
wcstombs
memset
strlen
_ftol
memmove
wcslen
??3@YAXPAX@Z
rand
mbstowcs
kernel32
WideCharToMultiByte
LocalFree
GetStartupInfoA
GetModuleHandleA
GetExitCodeThread
TerminateThread
CreateThread
lstrlenA
MultiByteToWideChar
GetLastError
InterlockedDecrement
SetEvent
WaitForSingleObject
LoadLibraryA
GetProcAddress
CloseHandle
Sleep
CreateEventA
user32
IsWindow
SendMessageA
CreateWindowExA
PostThreadMessageA
GetMessageA
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
ws2_32
WSAStartup
setsockopt
connect
getsockname
gethostname
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
WSACleanup
msvcp60
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ole32
OleRun
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
msvfw32
ICSendMessage
winmm
waveInPrepareHeader
waveInUnprepareHeader
waveInClose
waveOutPrepareHeader
waveOutWrite
waveInOpen
waveInReset
waveInStart
waveOutUnprepareHeader
waveOutOpen
waveInAddBuffer
waveOutClose
Sections
PAGE Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ