Static task
static1
Behavioral task
behavioral1
Sample
9c0b15d1ffd501f79a48f73b78a20716219c23eec27e1cc9d0e78735856416ae.exe
Resource
win7-20220812-en
General
-
Target
9c0b15d1ffd501f79a48f73b78a20716219c23eec27e1cc9d0e78735856416ae
-
Size
104KB
-
MD5
24c23e722e5d1073a638c2db1f16f760
-
SHA1
2ed5aa460510076fe2b9b648a6da059b992ec676
-
SHA256
9c0b15d1ffd501f79a48f73b78a20716219c23eec27e1cc9d0e78735856416ae
-
SHA512
ddb97b527911a8a2067ba4d8e195a7a9522a7a15121f0ef6955093db7b78d5a2c40fc94527df3a45acea85c277cc8d3aa2473f37ca9eb2dccf518411d6e37372
-
SSDEEP
3072:1aUM6S8cWFctXOxVlRsFRaOocqxZltuD5wfDmLsbRJaT:dDfcQctXOxKFcOo3xZltuD5W7bRAT
Malware Config
Signatures
Files
-
9c0b15d1ffd501f79a48f73b78a20716219c23eec27e1cc9d0e78735856416ae.exe windows x86
b0d9b12dabef05fd9512d7042e66dcdf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntA
CreateProcessA
TerminateProcess
CreateToolhelp32Snapshot
GetPrivateProfileStringA
Process32First
Process32Next
CloseHandle
GetFileAttributesA
WritePrivateProfileStringA
CreateDirectoryA
GetModuleFileNameA
VirtualFree
VirtualAlloc
FlushInstructionCache
GetCurrentProcess
OutputDebugStringA
SetFilePointer
WriteFile
CreateFileA
FileTimeToSystemTime
SetEndOfFile
ReadFile
GetProcessTimes
FileTimeToLocalFileTime
GetModuleHandleA
GetThreadLocale
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetACP
InterlockedExchange
GetVersionExA
user32
CallWindowProcA
DispatchMessageA
CreateWindowExA
GetMessageA
SetWindowLongA
DestroyWindow
IsWindow
TranslateMessage
MessageBoxA
GetWindowLongA
shell32
SHGetSpecialFolderPathA
msvcp80
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@V?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
msvcr80
_getpid
_vsnprintf_s
__argc
_snprintf
atol
malloc
fopen
free
fread
_time64
fclose
atoi
_mbsrchr
sscanf
memmove
??_V@YAXPAX@Z
??2@YAPAXI@Z
_access
strftime
_localtime64
__argv
realloc
_stricmp
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_crt_debugger_hook
_except_handler4_common
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_invalid_parameter_noinfo
??3@YAXPAX@Z
__CxxFrameHandler3
memcpy
memset
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE