Static task
static1
Behavioral task
behavioral1
Sample
d012a3354f29c137feb4db0c04aea21082d5049ba38fa96b3acfc32d67a096f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d012a3354f29c137feb4db0c04aea21082d5049ba38fa96b3acfc32d67a096f1.exe
Resource
win10v2004-20220901-en
General
-
Target
d012a3354f29c137feb4db0c04aea21082d5049ba38fa96b3acfc32d67a096f1
-
Size
286KB
-
MD5
31255963133a6679b45244db2ebd2de6
-
SHA1
9f1211dfa37fe8a411c6040d8fa8cb5da149d1a1
-
SHA256
d012a3354f29c137feb4db0c04aea21082d5049ba38fa96b3acfc32d67a096f1
-
SHA512
119167944dd850a613f3d041079805dcab8548cb26a37635116592eaf3c1bbed0b4d65a923428b82ca48e9a7a0aa14cb55c6e4c60a748fef72d080920ba9e564
-
SSDEEP
6144:ZxeUgNw4cW5zoyfC/erPrHS5Lqej4eKzua9Ky4xxZnXXycOwnFBB0gexnM9u2wkh:TeUav5zoyfprHS5LJj49T9KHxXOwnFBp
Malware Config
Signatures
Files
-
d012a3354f29c137feb4db0c04aea21082d5049ba38fa96b3acfc32d67a096f1.exe windows x86
038b40c42fe0f0d741a2e066e0805b87
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
mbstowcs
wcslen
wcstombs
atoi
wcscpy
_strupr
_beginthreadex
memcpy
calloc
_CIacos
printf
_CIpow
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_access
_controlfp
vsprintf
exit
fopen
fwrite
fclose
strrchr
_except_handler3
free
strcmp
strcpy
malloc
memcmp
memset
strlen
_ftol
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
??1type_info@@UAE@XZ
_CxxThrowException
putchar
rand
_chkesp
strncat
__set_app_type
strcat
kernel32
GetExitCodeThread
WideCharToMultiByte
GetStartupInfoA
GetModuleHandleA
LocalFree
TerminateThread
CreateThread
lstrlenA
MultiByteToWideChar
GetLastError
InterlockedDecrement
SetEvent
WaitForSingleObject
LoadLibraryA
GetProcAddress
CloseHandle
Sleep
CreateEventA
user32
GetMessageA
IsWindow
SendMessageA
CreateWindowExA
ws2_32
WSAStartup
setsockopt
connect
htons
getsockname
gethostname
send
select
closesocket
recv
ntohs
socket
gethostbyname
WSACleanup
msvcp60
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ole32
OleRun
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
msvfw32
ICSendMessage
winmm
waveInClose
waveInUnprepareHeader
waveInPrepareHeader
waveOutPrepareHeader
waveOutWrite
waveInOpen
waveInReset
waveInStart
waveOutUnprepareHeader
waveOutOpen
waveInAddBuffer
waveOutClose
Sections
PT#cBdeD Size: 201KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
>RsZeljr Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
P%!>*3mt Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
m::4"b=i Size: 24KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
h]V''"Yy Size: 928B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ