Static task
static1
Behavioral task
behavioral1
Sample
8695a5442bbbedcf91c392a75201e70e7624ca5c9319a31a1631d018f72eeb43.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8695a5442bbbedcf91c392a75201e70e7624ca5c9319a31a1631d018f72eeb43.exe
Resource
win10v2004-20221111-en
General
-
Target
8695a5442bbbedcf91c392a75201e70e7624ca5c9319a31a1631d018f72eeb43
-
Size
88KB
-
MD5
6d5f527d15977dbb16b9b2bb471e3fe1
-
SHA1
615b4b222b3d0af32c8a2c0897e2d1c658a51c94
-
SHA256
8695a5442bbbedcf91c392a75201e70e7624ca5c9319a31a1631d018f72eeb43
-
SHA512
68b92bda4b59bf5d1359afe2752cb257cc505c733fa6c383417f164a22ba488d8aa2ea86aa9417aa43c764aee977b1bcaf740e7df1f838aa9184d03018cfca7a
-
SSDEEP
1536:rk3FSROdGa2ibckTaf/pEuYUCW0VAq/sU:rk3FFJ2ibLTc/pEuYrW0VAqUU
Malware Config
Signatures
Files
-
8695a5442bbbedcf91c392a75201e70e7624ca5c9319a31a1631d018f72eeb43.exe windows x86
7fde1854acfe532b45ec63364968adba
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
lstrcpyA
TerminateThread
CreateThread
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
DeleteFileA
GetSystemDirectoryA
SetFileAttributesA
MoveFileExA
MoveFileA
LoadLibraryA
GetTempPathA
GetLastError
HeapAlloc
GetProcessHeap
VirtualProtect
IsBadReadPtr
HeapFree
FreeLibrary
lstrlenA
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
OpenEventA
CreateMutexA
GetCurrentThreadId
GetModuleHandleA
GetProcAddress
GetFileSize
CreateFileA
SetFilePointer
WriteFile
CloseHandle
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
VirtualAlloc
EnterCriticalSection
GetStartupInfoA
Sleep
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetTickCount
InitializeCriticalSection
user32
SendInput
PostMessageA
GetDlgCtrlID
SendMessageA
FindWindowExA
FindWindowA
GetWindow
ShowWindow
GetMessageA
PostThreadMessageA
GetInputState
RegisterClassA
LoadCursorA
wsprintfA
MessageBoxA
LoadIconA
advapi32
RegSetValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegCreateKeyA
DeleteService
OpenServiceA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegCloseKey
msvcrt
??1type_info@@UAE@XZ
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
calloc
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memmove
_ftol
??2@YAPAXI@Z
strrchr
exit
realloc
free
_except_handler3
malloc
atoi
time
ws2_32
recv
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
closesocket
send
WSACleanup
gethostname
getsockname
WSAStartup
select
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ