Static task
static1
Behavioral task
behavioral1
Sample
70d98617dd031adb4ec38dfeb2f3e4e8793f7a9b207e357999da7663abc692ef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
70d98617dd031adb4ec38dfeb2f3e4e8793f7a9b207e357999da7663abc692ef.exe
Resource
win10v2004-20221111-en
General
-
Target
70d98617dd031adb4ec38dfeb2f3e4e8793f7a9b207e357999da7663abc692ef
-
Size
344KB
-
MD5
22a3e71452273cb09ce26727540fcef0
-
SHA1
0eba3a2162159f99581862e209c9de8d5f0e2c19
-
SHA256
70d98617dd031adb4ec38dfeb2f3e4e8793f7a9b207e357999da7663abc692ef
-
SHA512
79949a65023431d63dead13a35ae5509619ba028003af777ec14f0e6d82b0f8fad64c12efd0cee53ed126b1bda961783cd7ea921ed3ab692130ee9c5725e90a3
-
SSDEEP
6144:0zGx4ucqaGb1qr32RfS15xNNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:iU4ZF2ErNxDIBuOFe7/uT
Malware Config
Signatures
Files
-
70d98617dd031adb4ec38dfeb2f3e4e8793f7a9b207e357999da7663abc692ef.exe windows x86
62ba122a152fde67c5a91d46b6afcb9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ws2_32
inet_addr
WSAGetLastError
gethostbyname
inet_ntoa
htonl
getservbyname
htons
gethostbyaddr
ntohs
getservbyport
connect
setsockopt
closesocket
recv
send
socket
kernel32
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
MultiByteToWideChar
GetCurrentThreadId
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
HeapFree
ReadFile
HeapAlloc
GetProcessHeap
InterlockedIncrement
LoadLibraryW
InterlockedDecrement
GetModuleFileNameW
Sleep
GetLocalTime
CloseHandle
GetPrivateProfileStringW
CreateFileW
lstrlenW
GetLastError
FindNextFileW
DeleteFileW
FindFirstFileW
FlushInstructionCache
GetCurrentProcess
GlobalAlloc
GlobalUnlock
GlobalLock
SetLastError
GlobalFree
GlobalHandle
lstrcpyW
MulDiv
lstrcmpW
SetErrorMode
CreateEventW
OpenEventW
GetModuleHandleW
LoadLibraryExW
lstrcmpiW
lstrcpynW
GetSystemDirectoryW
WideCharToMultiByte
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetModuleHandleA
GetVersionExW
GetThreadLocale
HeapReAlloc
GetLocaleInfoA
GetACP
InterlockedExchange
GetCurrentProcessId
GetSystemTimeAsFileTime
GetVersionExA
HeapDestroy
FindClose
HeapSize
ExitProcess
user32
MapDialogRect
SetWindowContextHelpId
wsprintfW
CreateWindowExW
CreateAcceleratorTableW
CharNextW
GetClassNameW
RedrawWindow
IsWindow
DestroyAcceleratorTable
GetFocus
IsChild
SetFocus
BeginPaint
EndPaint
CallWindowProcW
GetDesktopWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
FillRect
SetCapture
ReleaseCapture
GetSysColor
CreateDialogIndirectParamW
RegisterWindowMessageW
GetClassInfoExW
LoadCursorW
RegisterClassExW
GetWindowTextLengthW
GetWindowTextW
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
ShowWindow
UnregisterClassW
PostQuitMessage
SendMessageW
SetWindowLongW
GetParent
GetWindow
GetWindowRect
SystemParametersInfoW
GetClientRect
MapWindowPoints
SetWindowPos
IsDialogMessageW
GetDlgItem
KillTimer
SetTimer
SetWindowPlacement
SetWindowTextW
PostMessageW
GetWindowLongW
DestroyWindow
gdi32
DeleteObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
GetObjectW
GetStockObject
CreateSolidBrush
SelectObject
advapi32
RegDeleteValueW
RegQueryValueExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
shell32
SHGetFolderPathW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
StringFromGUID2
CoTaskMemAlloc
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
CoTaskMemRealloc
oleaut32
VarBstrCat
SysAllocStringLen
VariantClear
SysAllocString
SysStringLen
SysFreeString
VariantCopy
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysStringByteLen
DispCallFunc
VariantInit
msvcr71
free
_CxxThrowException
memset
_except_handler3
??3@YAXPAX@Z
memmove
wcslen
__CxxFrameHandler
??_V@YAXPAX@Z
realloc
_itow
_wtoi
??2@YAPAXI@Z
strcpy
calloc
strlen
strncpy
strcmp
strtoul
strchr
sprintf
strcat
_snprintf
strstr
??_U@YAPAXI@Z
atoi
wcsstr
_vscwprintf
vswprintf
??1exception@@UAE@XZ
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
wcscat
wcscmp
_purecall
memcmp
malloc
_mbsinc
_ismbcspace
__security_error_handler
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_cexit
exit
_wcmdln
_amsg_exit
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memcpy
wcschr
shlwapi
PathIsSameRootW
PathCombineW
StrStrIA
PathAppendW
StrChrIA
comctl32
InitCommonControlsEx
msvcp71
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
atl71
ord30
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE