Static task
static1
Behavioral task
behavioral1
Sample
bfb1f4e64c3628f6171959c87fb35d5250009d5983f510e3bb5164b8224d5cd8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bfb1f4e64c3628f6171959c87fb35d5250009d5983f510e3bb5164b8224d5cd8.exe
Resource
win10v2004-20220812-en
General
-
Target
bfb1f4e64c3628f6171959c87fb35d5250009d5983f510e3bb5164b8224d5cd8
-
Size
180KB
-
MD5
09d8d889cd1f66a1a6b90ae97494dcd0
-
SHA1
84c6019001b760c01172ed4df17150aa065a6988
-
SHA256
bfb1f4e64c3628f6171959c87fb35d5250009d5983f510e3bb5164b8224d5cd8
-
SHA512
5b7e81f28702894ae1f6c3af1592eb13576d6f3be3660f0d64ad8164a6f6dbc66d6e4a51c59d2fe60fba27d3271423fb60521b63963263d7473d4b8fc60ec9e2
-
SSDEEP
3072:QYKmjUJOAVGxUcmQNlby6APYa9nxv0GgSqSLnsFmAPRnVzoI7h+aS1Gn:9KmwOAVGxU81Cx8/3mApVzo0naGn
Malware Config
Signatures
Files
-
bfb1f4e64c3628f6171959c87fb35d5250009d5983f510e3bb5164b8224d5cd8.exe windows x86
285d430084961aaa803062c216828f82
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
connect
WSACleanup
WSACloseEvent
recv
send
accept
htonl
htons
WSAEventSelect
select
getsockname
WSAStartup
listen
bind
socket
WSASetEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSACreateEvent
WSAGetLastError
closesocket
ole32
OleInitialize
OleUninitialize
advapi32
EqualSid
CreateServiceA
DeleteService
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
QueryServiceStatus
StartServiceA
ControlService
CloseServiceHandle
RegDeleteValueA
SetServiceStatus
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenThreadToken
OpenProcessToken
GetTokenInformation
FreeSid
AllocateAndInitializeSid
msvcr71
isxdigit
iswctype
fread
sscanf
_strnicmp
_purecall
isdigit
strtod
isspace
getenv
_iob
_vsnprintf
setlocale
strftime
localtime
time
abort
_endthreadex
_beginthreadex
tolower
fgets
??1type_info@@UAE@XZ
__dllonexit
_onexit
__security_error_handler
_c_exit
_exit
_XcptFilter
_cexit
__p___initenv
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_controlfp
_except_handler3
strcspn
sprintf
fclose
printf
_strtoui64
_strtoi64
strtol
??_U@YAPAXI@Z
localeconv
strtoul
fopen
_errno
strerror
??0bad_cast@@QAE@PBD@Z
??1bad_cast@@UAE@XZ
??0bad_cast@@QAE@ABV0@@Z
fprintf
free
??_V@YAXPAX@Z
memchr
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
_stat
memcpy
__crtLCMapStringA
__pctype_func
isupper
___lc_codepage_func
___lc_handle_func
_unlock
malloc
_lock
___setlc_active_func
___unguarded_readlc_active_add_func
islower
__uncaught_exception
exit
fflush
kernel32
GetTickCount
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
GlobalMemoryStatus
WaitForMultipleObjects
DeviceIoControl
UnmapViewOfFile
VirtualUnlock
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
VirtualLock
LoadLibraryExA
MapViewOfFile
CreateFileMappingA
Sleep
GetSystemTimeAsFileTime
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleHandleA
SetConsoleCtrlHandler
GetCurrentProcessId
OpenProcess
SetPriorityClass
CreateEventA
SetEvent
WaitForSingleObject
GetCurrentThread
WideCharToMultiByte
CreateFileA
GetLogicalDrives
QueryDosDeviceA
GetFullPathNameA
GetLongPathNameA
GetModuleFileNameA
GetThreadLocale
CloseHandle
SetErrorMode
GetVersionExA
GetSystemInfo
LoadLibraryA
GetLastError
GetCurrentProcess
GetProcAddress
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ