Static task
static1
Behavioral task
behavioral1
Sample
d3b9b5ad06bf2945b70eeb1443d2ea355736f29089ade7e4d696116318183377.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d3b9b5ad06bf2945b70eeb1443d2ea355736f29089ade7e4d696116318183377.exe
Resource
win10v2004-20221111-en
General
-
Target
d3b9b5ad06bf2945b70eeb1443d2ea355736f29089ade7e4d696116318183377
-
Size
108KB
-
MD5
5fa77c1022890d1fc64266b8161054a3
-
SHA1
754158b500d30c46216aae6d1dafdcbecd3c5360
-
SHA256
d3b9b5ad06bf2945b70eeb1443d2ea355736f29089ade7e4d696116318183377
-
SHA512
c3d050639c6081cd8e5219b36b92d06087084f565630d9e7dc17229258eb4c95d2639d42220f3223cd8fc1908819f474214564646c64213708eb0038870a5422
-
SSDEEP
1536:n/sa0IOqnToIftHUXKyAgOHmQehpZwKtpMHH/6HFwoJ+6bvfvqw7NhZl/J3dyVkw:/saaGTBftyxZwglTvT5hTJ3dy+Zul
Malware Config
Signatures
Files
-
d3b9b5ad06bf2945b70eeb1443d2ea355736f29089ade7e4d696116318183377.exe windows x86
a009b1205701cd71c21ac9c996dfaa32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
MoveFileExA
GetTempPathA
GetModuleFileNameA
GetSystemDirectoryA
FreeLibrary
GetCurrentProcess
GetVersionExA
OpenEventA
ExitProcess
GetExitCodeProcess
GetShortPathNameA
GetCurrentThreadId
WriteFile
HeapAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
lstrcmpiA
Process32Next
Process32First
OpenProcess
GetStartupInfoA
GetModuleHandleA
OutputDebugStringA
TerminateThread
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
GetWindowsDirectoryA
GetTickCount
GetProcessHeap
HeapFree
SetLastError
LoadLibraryA
GetProcAddress
CreateThread
MoveFileA
EnterCriticalSection
LeaveCriticalSection
VirtualFree
InitializeCriticalSection
Sleep
DeleteCriticalSection
CreateMutexA
user32
GetInputState
LoadCursorA
DestroyCursor
SendMessageA
SystemParametersInfoA
keybd_event
MapVirtualKeyA
mouse_event
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
PostMessageA
CharNextA
wsprintfA
GetMessageA
PostThreadMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetCursorInfo
GetCursorPos
ReleaseDC
gdi32
DeleteDC
DeleteObject
GetDIBits
CreateDIBSection
SelectObject
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
advapi32
CloseServiceHandle
ControlService
DeleteService
RegOpenKeyExA
RegQueryValueA
RegCloseKey
OpenServiceA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceA
CreateServiceA
OpenSCManagerA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
QueryServiceStatus
shell32
ShellExecuteA
SHGetSpecialFolderPathA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
realloc
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
_beginthreadex
strchr
strncat
sprintf
rand
_strcmpi
exit
strncpy
strcat
strcpy
strcmp
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
printf
memcpy
memmove
ceil
_ftol
strlen
strstr
memset
??2@YAPAXI@Z
memcmp
free
malloc
_except_handler3
strrchr
ws2_32
select
recv
closesocket
htons
send
gethostname
getsockname
socket
connect
setsockopt
WSAStartup
WSACleanup
WSAIoctl
gethostbyname
msvcp60
??1Init@ios_base@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0Init@ios_base@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
avicap32
capGetDriverDescriptionA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.data Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ