Static task
static1
Behavioral task
behavioral1
Sample
4be1c494095ee418c60a034f7663b1e4767025a7ca673e48e97d592c016b684f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4be1c494095ee418c60a034f7663b1e4767025a7ca673e48e97d592c016b684f.exe
Resource
win10v2004-20220812-en
General
-
Target
4be1c494095ee418c60a034f7663b1e4767025a7ca673e48e97d592c016b684f
-
Size
112KB
-
MD5
25fda5009323803a6db0e3fe07fccfb4
-
SHA1
4372148c9fe5ae1b151e21e7357934590e01151e
-
SHA256
4be1c494095ee418c60a034f7663b1e4767025a7ca673e48e97d592c016b684f
-
SHA512
be047e8179c89d49d6202c1c7f272efd3109049d0cd5ed4bddaadc6262a179951020439cbfdc77991ea8532ed773719426e8650b713e4ea75014bd9108df1b39
-
SSDEEP
3072:GBrktPOaMvyJFu1Nq1XaSQy7iXryl7DOND5v06V:JtPOaMGEbq1XDWZND5f
Malware Config
Signatures
Files
-
4be1c494095ee418c60a034f7663b1e4767025a7ca673e48e97d592c016b684f.exe windows x86
30eabb7072e04afedf3ed23968c72ec6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hpqxmlul
SB_getListOfFilesAndXMLCode
SB_sortListBySequenceNum
SB_getFilegivenSeq
hpqmfc10
??0CAiOCommandLineInfo@@QAE@XZ
??1CAiOCommandLineInfo@@UAE@XZ
mfc80
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4277
ord4722
ord3403
ord1306
ord2173
ord5205
ord4185
ord6275
ord5073
ord1908
ord5148
ord4244
ord1402
ord3945
ord1617
ord1620
ord5915
ord6725
ord1557
ord4019
ord2424
ord2425
ord2992
ord5356
ord943
ord4904
ord2939
ord4135
ord4309
ord5012
ord5009
ord2615
ord1913
ord2246
ord751
ord5165
ord762
ord4041
ord2003
ord2145
ord2144
ord5859
ord4299
ord3648
ord1185
ord566
ord3333
ord4261
ord4481
ord2838
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord3345
ord4038
ord757
ord354
ord3182
ord4262
ord5175
ord4282
ord5203
ord5152
ord1401
ord3946
ord5912
ord6724
ord1551
ord1670
ord1671
ord2020
ord4580
ord4890
ord4735
ord4212
ord5182
ord605
ord3641
ord578
ord1084
ord3683
ord4467
ord4469
ord3255
ord781
ord304
ord310
ord1207
ord1181
ord5320
ord2346
ord6286
ord1580
ord2468
ord911
ord907
ord784
ord2902
ord876
ord5331
ord6297
ord5225
ord5119
ord959
ord547
ord4031
ord5975
ord3450
ord3645
ord368
ord4264
ord4482
ord6043
ord5934
ord2768
ord3040
ord4222
ord1922
ord4739
ord4852
ord4257
ord5495
ord2742
ord5412
ord1379
ord5592
ord5156
ord2051
ord2016
ord6238
ord2621
ord2614
ord4566
ord616
ord4705
ord3591
ord3682
ord565
ord4273
ord1361
ord3344
ord5214
ord5151
ord3974
ord4861
ord4864
ord4379
ord4384
ord4381
ord4399
ord4401
ord4386
ord4777
ord4591
ord4181
ord4172
ord4980
ord4781
ord4204
ord4790
ord4443
ord4444
ord756
ord5174
ord4967
ord1362
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4265
ord395
ord553
ord562
ord635
ord742
ord3466
ord764
ord4014
ord297
msvcr80
__p__fmode
__set_app_type
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
_except_handler4_common
strcat_s
memset
__CxxFrameHandler3
_setmbcp
kernel32
InterlockedExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetSystemTimeAsFileTime
CloseHandle
CreateProcessA
DeleteFileA
GetPrivateProfileStringA
GetProfileStringA
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
user32
DdeFreeDataHandle
DdeClientTransaction
DdeUninitialize
DdeDisconnect
DdeFreeStringHandle
WaitForInputIdle
EnableWindow
DdeCreateDataHandle
DdeQueryNextServer
DdeConnectList
DdeCreateStringHandleA
DdeInitializeA
DdeConnect
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE