Static task
static1
Behavioral task
behavioral1
Sample
023ec623bdba775075ab58ec7d364d9f1bb96a82fd1a7e99b6ab48e63ba9aab1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
023ec623bdba775075ab58ec7d364d9f1bb96a82fd1a7e99b6ab48e63ba9aab1.exe
Resource
win10v2004-20221111-en
General
-
Target
023ec623bdba775075ab58ec7d364d9f1bb96a82fd1a7e99b6ab48e63ba9aab1
-
Size
190KB
-
MD5
400ca32a30750e5b264b87f78b35faa0
-
SHA1
58b2e44f00262f8251725b97c585cf3980d921ba
-
SHA256
023ec623bdba775075ab58ec7d364d9f1bb96a82fd1a7e99b6ab48e63ba9aab1
-
SHA512
1ec66faa86a4711306da96cb03f95269d58d9388a88a6feba34cfd786ad0bd9a9ab1a0e32cbaeddf9ea31e81c4f2505f0ad459e0285d8de89485e0dab9de54c2
-
SSDEEP
3072:NWzw9+x6SIQOzb/fC/5ZqSuAD5rlpp3p93Z2avJlWqIrSZLtW:NWOE6NQOX/fC/iVwBB7Zl7TJW
Malware Config
Signatures
Files
-
023ec623bdba775075ab58ec7d364d9f1bb96a82fd1a7e99b6ab48e63ba9aab1.exe windows x86
b87ff60a12a09e5a953fd0d11b091edd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80u
ord2011
ord605
ord3327
ord283
ord4255
ord577
ord4475
ord3943
ord2638
ord4535
ord3703
ord3713
ord3677
ord3712
ord2527
ord2640
ord2534
ord2832
ord566
ord2708
ord757
ord293
ord4301
ord2829
ord2725
ord2531
ord5562
ord5209
ord5226
ord4562
ord3942
ord2239
ord5222
ord5220
ord2925
ord1911
ord2399
ord2381
ord2379
ord2397
ord2409
ord1894
ord2386
ord354
ord2402
ord2407
ord2390
ord2392
ord2394
ord3635
ord2388
ord501
ord2404
ord709
ord2384
ord931
ord927
ord5971
ord925
ord920
ord1058
ord5229
ord5231
ord5956
ord1591
ord4276
ord1079
ord4716
ord3397
ord5199
ord4179
ord4574
ord6271
ord5067
ord4743
ord1899
ord2365
ord5148
ord4238
ord1392
ord3940
ord4098
ord1608
ord1611
ord5908
ord3176
ord6720
ord4256
ord4480
ord1542
ord2856
ord1661
ord5196
ord1662
ord1590
ord4884
ord1646
ord4729
ord1647
ord4206
ord1955
ord5178
ord5171
ord1353
ord4961
ord3339
ord6275
ord3796
ord4026
ord6273
ord1513
ord2163
ord2169
ord1198
ord4032
ord1049
ord1239
ord4008
ord3824
ord6272
ord3795
ord304
ord6274
ord4320
ord2054
ord578
ord2009
ord5579
ord3800
ord1236
ord1007
ord5096
ord6215
ord6166
ord5378
ord3826
ord762
ord929
ord764
msvcr80
_snwprintf_s
tolower
??0exception@std@@QAE@XZ
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
_amsg_exit
memset
__CxxFrameHandler3
_invalid_parameter_noinfo
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_CxxThrowException
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
memmove_s
??0exception@std@@QAE@ABV01@@Z
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
??0exception@std@@QAE@ABQBD@Z
__dllonexit
kernel32
WaitForSingleObject
CloseHandle
OutputDebugStringW
GetCommandLineW
GetModuleFileNameW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
CreateProcessW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
SetUnhandledExceptionFilter
FindFirstFileW
FindClose
user32
PostMessageW
GetSystemMenu
DrawIcon
EnableWindow
GetClientRect
GetSystemMetrics
LoadIconW
SendMessageW
IsIconic
AppendMenuW
shell32
ShellExecuteA
SHGetSpecialFolderPathA
comctl32
InitCommonControlsEx
shlwapi
PathRemoveFileSpecW
msvcp80
?swap@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXAAV12@@Z
?assign@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@PB_WI@Z
?assign@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@PB_W@Z
?erase@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?compare@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEHPB_W@Z
?end@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE?AV?$_String_iterator@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@2@XZ
??$?8_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA_NABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@0@Z
?begin@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE?AV?$_String_iterator@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@2@XZ
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE