Static task
static1
Behavioral task
behavioral1
Sample
fd4845cd7deef68fc57b4dd6c1c4806686145657a2be08c4d46b167c9df303ce.exe
Resource
win7-20220812-en
General
-
Target
fd4845cd7deef68fc57b4dd6c1c4806686145657a2be08c4d46b167c9df303ce
-
Size
588KB
-
MD5
025387dd4f24847516237f55e913bad5
-
SHA1
2010e8f192449436731f14fd756239f7bad03755
-
SHA256
fd4845cd7deef68fc57b4dd6c1c4806686145657a2be08c4d46b167c9df303ce
-
SHA512
fef98c75716596bf6d0b77ce8ca63cca5558fe7aa679f7c7553408768b58fc8e1c2dcef8471451895416beed9413cee103f3118155afdeb531755e73f9d9665c
-
SSDEEP
12288:qXR2D/HOcfxGk5e3fbbREgC8VrtuqN/IrjD6yVQihlg:qEzOcfxGk5ePbygCI7NUVC
Malware Config
Signatures
Files
-
fd4845cd7deef68fc57b4dd6c1c4806686145657a2be08c4d46b167c9df303ce.exe windows x86
6c426e7c6e3e940e5e5b74af51c68765
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htonl
bind
getsockname
listen
accept
inet_ntoa
WSAStartup
inet_addr
gethostbyaddr
htons
gethostbyname
socket
connect
WSAGetLastError
closesocket
mpr
WNetAddConnection2A
WNetCancelConnection2A
comctl32
ord17
CreateToolbarEx
kernel32
lstrlenA
GetTimeFormatA
InitializeCriticalSection
GetCurrentProcessId
GetComputerNameA
GetFullPathNameA
GetCommandLineA
GetVersion
GetOverlappedResult
WriteFile
ResetEvent
WaitForMultipleObjects
ReadFile
LockResource
SizeofResource
LoadResource
FindResourceA
LocalAlloc
GetCommandLineW
RaiseException
GetTickCount
GlobalReAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcpyA
lstrcatA
HeapFree
HeapAlloc
GetProcessHeap
GetDateFormatA
DosDateTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileSize
GlobalFree
WriteFileEx
QueueUserAPC
SleepEx
ExpandEnvironmentStringsA
SetFilePointer
FindFirstFileA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
GetModuleFileNameA
GetStdHandle
ExitProcess
Sleep
HeapReAlloc
VirtualAlloc
FatalAppExitA
DeleteCriticalSection
VirtualFree
HeapDestroy
HeapCreate
LCMapStringW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetCurrentThread
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
GetCPInfo
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
CreateThread
ResumeThread
ExitThread
SearchPathA
FindClose
GlobalMemoryStatus
LoadLibraryA
FreeLibrary
CreateFileA
QueryPerformanceFrequency
GetLocaleInfoA
GetCurrentDirectoryA
GetSystemDirectoryA
DeviceIoControl
GetCurrentThreadId
WaitForSingleObject
TerminateThread
SetLastError
EnterCriticalSection
LeaveCriticalSection
OpenMutexA
CreateMutexA
CreateFileMappingA
MapViewOfFile
CreateEventA
UnmapViewOfFile
GetSystemTime
SystemTimeToFileTime
QueryPerformanceCounter
SetEvent
InterlockedIncrement
CloseHandle
lstrcpynA
GetLastError
FormatMessageA
LocalFree
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetEnvironmentVariableA
DeleteFileA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
SetConsoleCtrlHandler
InterlockedExchange
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetTimeZoneInformation
HeapSize
GetLocaleInfoW
SetEndOfFile
CompareStringA
CompareStringW
GetSystemTimeAsFileTime
SetEnvironmentVariableA
user32
BeginPaint
DrawTextA
EndPaint
GetFocus
ClientToScreen
ScreenToClient
GetDialogBaseUnits
DrawFocusRect
GetParent
IsDlgButtonChecked
PostMessageA
CheckRadioButton
DialogBoxIndirectParamA
InflateRect
RegisterClassExA
FindWindowA
LoadAcceleratorsA
RegisterWindowMessageA
MsgWaitForMultipleObjects
PeekMessageA
TranslateAcceleratorA
IsWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetMessageA
RegisterClassA
LoadBitmapA
SetTimer
LoadStringA
MoveWindow
DefWindowProcA
KillTimer
GetClientRect
InvalidateRgn
CreateDialogParamA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
CallWindowProcA
GetWindowThreadProcessId
SetWindowLongA
GetCursorPos
DestroyWindow
SetForegroundWindow
TrackPopupMenu
CreateWindowExA
UpdateWindow
SetWindowPos
SetDlgItemTextA
SendDlgItemMessageA
AttachThreadInput
AppendMenuA
SetMenuItemBitmaps
DialogBoxParamA
SetFocus
GetDlgItemTextA
SetCapture
ReleaseCapture
EnableMenuItem
DeleteMenu
GetWindowRect
IsIconic
IsZoomed
SendMessageA
GetSystemMetrics
LoadIconA
GetWindowTextA
ShowWindow
GetDC
GetMenuCheckMarkDimensions
ReleaseDC
PostQuitMessage
SetWindowTextA
EndDialog
GetDlgItem
LoadCursorA
GetSysColorBrush
GetSysColor
ChildWindowFromPoint
InvalidateRect
SetCursor
GetSubMenu
GetMenuItemCount
InsertMenuItemA
MessageBoxA
GetMenu
CheckMenuItem
EnableWindow
CheckDlgButton
ModifyMenuA
gdi32
CreateFontA
GetTextExtentPointA
TextOutA
AbortDoc
GetTextExtentPoint32A
ExtTextOutA
SetAbortProc
SetBkColor
GetDeviceCaps
SetMapMode
StartDocA
StartPage
EndPage
EndDoc
GetTextMetricsA
DeleteObject
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectA
GetObjectA
GetStockObject
DeleteDC
StretchBlt
CreateCompatibleBitmap
CreateSolidBrush
CreateCompatibleDC
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
FindTextA
ChooseFontA
PrintDlgA
advapi32
OpenSCManagerA
DeleteService
ControlService
OpenServiceA
StartServiceA
QueryServiceStatus
CreateServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
shell32
ShellExecuteExA
SHGetMalloc
SHGetSpecialFolderLocation
SHBrowseForFolderA
Shell_NotifyIconA
ShellExecuteA
Sections
.text Size: 201KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE