Static task
static1
Behavioral task
behavioral1
Sample
500d11b993e3f978cdaf1b13e7393b01813eee33342cb1f70e891405c35cafad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
500d11b993e3f978cdaf1b13e7393b01813eee33342cb1f70e891405c35cafad.exe
Resource
win10v2004-20221111-en
General
-
Target
500d11b993e3f978cdaf1b13e7393b01813eee33342cb1f70e891405c35cafad
-
Size
124KB
-
MD5
486452e3d95297ae3fcf4ef554bb3eb0
-
SHA1
7e51efe41b8074949eb4204e90d81d678d051935
-
SHA256
500d11b993e3f978cdaf1b13e7393b01813eee33342cb1f70e891405c35cafad
-
SHA512
3ecca57f348e88b4465516ff8012477d8934d05f7b9c11ddbfc7290b5490f327dac414a104d10678b974e266d0c04421d4772ee519651c8c5e2e5d4bb385dda0
-
SSDEEP
1536:8Rda0R9aLHDJmvKd67MRvRQlDXwO3g3UfXZ4JRpOLxMYNYePRTGCq2iW7z:8RdbR+gCchwO3g3iJ4oLxzuePVGCH
Malware Config
Signatures
Files
-
500d11b993e3f978cdaf1b13e7393b01813eee33342cb1f70e891405c35cafad.exe windows x86
f2f5b0c1766a021b02032e84ddf47ba2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
bzw
?GetKeyVal@CBcfFile@@QAEHV?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@0H@Z
?Glb@@YAAAVCGlobal@@XZ
?GetKeyVal@CBcfFile@@QAE?AV?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@V23@0PBD@Z
?GetAppPath@CBcfFile@@SA?AV?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@_N@Z
??0CBcfFile@@QAE@V?$CStringT@DV?$StrTraitMFC_DLL@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@@Z
??1CBcfFile@@QAE@XZ
cfgengine
?cfgClose@@YAXK@Z
mfc80
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord757
ord2020
ord5975
ord1054
ord3830
ord1100
ord1126
ord605
ord736
ord1489
ord6118
ord299
ord6703
ord3641
ord354
ord3182
ord4262
ord4486
ord2862
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord2835
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord6724
ord1551
ord1670
ord1671
ord4580
ord4890
ord4735
ord4212
ord5182
ord1794
ord4104
ord6065
ord6283
ord1123
ord3934
ord4035
ord4749
ord709
ord501
ord3140
ord630
ord3088
ord2021
ord385
ord4564
ord2371
ord1903
ord1063
ord572
ord3312
ord2991
ord5214
ord1402
ord5915
ord6725
ord1588
ord1646
ord1187
ord755
ord5563
ord2451
ord1533
ord6138
ord564
ord5717
ord3255
ord266
ord5331
ord6297
ord265
ord6286
ord1181
ord5320
ord3441
ord356
ord6090
ord5403
ord2372
ord3684
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord4541
ord3683
ord1084
ord304
ord911
ord297
ord5529
ord2902
ord3997
ord781
ord876
ord2322
ord4085
ord1486
ord2469
ord386
ord2280
ord631
ord5714
ord1185
ord310
ord784
ord4081
ord1482
ord578
ord5444
ord762
ord530
ord370
ord6005
ord722
ord618
ord764
ord932
ord1207
msvcr80
_controlfp_s
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_encode_pointer
_unlock
??0exception@std@@QAE@XZ
_invoke_watson
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
_CxxThrowException
rand
sprintf
fopen
vfprintf
fprintf
fclose
memcpy_s
memcpy
atoi
__CxxFrameHandler3
_purecall
memset
_time64
_setmbcp
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
??1exception@std@@UAE@XZ
strlen
strcpy
exit
__p__fmode
kernel32
GetCommandLineA
InterlockedExchange
SetCurrentDirectoryA
GetLastError
GetModuleHandleA
CloseHandle
GetCurrentDirectoryA
MapViewOfFile
CreateFileMappingA
GetTickCount
CreateProcessA
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
GetProcAddress
UnmapViewOfFile
GetModuleFileNameA
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
FreeLibrary
user32
PostMessageA
BringWindowToTop
GetParent
IsWindow
LoadIconA
EnableWindow
KillTimer
SetTimer
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
GetSystemMetrics
GetWindowLongA
SetWindowLongA
wsprintfA
advapi32
RegSetValueA
RegCreateKeyA
comctl32
InitCommonControlsEx
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
��폣u� Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE