Static task
static1
Behavioral task
behavioral1
Sample
812909ef0e0bb80c2554233347e2fc3843fb86c1762f83cb38325f6cc34590b2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
812909ef0e0bb80c2554233347e2fc3843fb86c1762f83cb38325f6cc34590b2.exe
Resource
win10v2004-20221111-en
General
-
Target
812909ef0e0bb80c2554233347e2fc3843fb86c1762f83cb38325f6cc34590b2
-
Size
29KB
-
MD5
7f401ab476ad02aeb2154d5b07e02754
-
SHA1
4e872849900f247ba1533949bdcf8849e79dde11
-
SHA256
812909ef0e0bb80c2554233347e2fc3843fb86c1762f83cb38325f6cc34590b2
-
SHA512
866437c04c1391d220cb67cb4cc3764895ecd330f6e1f095b6df4ae61d16cc213f6fd11b544142af51afad53b5af4da2eec3582bba9c48a2e1b52cced136dec1
-
SSDEEP
384:x2pVGbBXbiUQ4Q9G3qz9nvO1R5XnisuwwBgpzwVhN2VjqnW4tsj8lloOOuK+Yy+q:ApeXbyBnvk5XtQN2VjX4tk8lIy+q
Malware Config
Signatures
Files
-
812909ef0e0bb80c2554233347e2fc3843fb86c1762f83cb38325f6cc34590b2.exe windows x86
3766005650ea0b17ad97bf33852590e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
ExitProcess
GetLastError
CreateMutexA
SetPriorityClass
CopyFileA
GetSystemDirectoryA
GlobalMemoryStatusEx
GetComputerNameA
GetSystemDefaultUILanguage
GetModuleHandleA
TerminateProcess
ExitThread
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
WaitForSingleObject
GetTempPathA
LoadLibraryA
GetProcAddress
WinExec
OpenMutexA
ReleaseMutex
CloseHandle
CreateThread
lstrlenA
Sleep
GetStartupInfoA
GetTickCount
user32
GetDesktopWindow
wsprintfA
advapi32
CreateServiceA
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
RegCloseKey
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
DeleteService
RegQueryValueExA
shell32
ShellExecuteA
ws2_32
select
__WSAFDIsSet
recv
send
WSAIoctl
htons
socket
connect
WSAStartup
setsockopt
closesocket
gethostbyname
inet_addr
sendto
WSASocketA
htonl
msvcrt
rand
_initterm
_controlfp
??1type_info@@UAE@XZ
??3@YAXPAX@Z
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
realloc
malloc
atoi
strncpy
strcspn
strstr
exit
sprintf
localtime
time
strncmp
_except_handler3
__getmainargs
__CxxFrameHandler
_CxxThrowException
_exit
_XcptFilter
_acmdln
__setusermatherr
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE