Static task
static1
Behavioral task
behavioral1
Sample
38a432c8984a1fbcf18746f5d080414facf89b9261e6236859b719499dc0e194.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
38a432c8984a1fbcf18746f5d080414facf89b9261e6236859b719499dc0e194.exe
Resource
win10v2004-20220812-en
General
-
Target
38a432c8984a1fbcf18746f5d080414facf89b9261e6236859b719499dc0e194
-
Size
472KB
-
MD5
b4f3bf620920ca5b2eed21c8573fc0d0
-
SHA1
0ac0e836a7971e2878a96ad8a20853f330d23341
-
SHA256
38a432c8984a1fbcf18746f5d080414facf89b9261e6236859b719499dc0e194
-
SHA512
64bb4e2bda57ac4647ae3979c2c9e72a42b53c0877f1700ec60193065e050eeac1923230c32abb044be20ca39517df716f4c03c79a2d4c18b0195ccf91775dbb
-
SSDEEP
12288:W0xIFJMMYFp+4FiNpm/yl69Cn4lA0ZN4A45vSWA8ad:W0SFJMMYFp+imZg+0ZNF4VSWAZ
Malware Config
Signatures
Files
-
38a432c8984a1fbcf18746f5d080414facf89b9261e6236859b719499dc0e194.exe windows x86
9596b621648081a927de83de060d7219
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord3744
ord5059
ord1720
ord5257
ord2438
ord2116
ord5273
ord4621
ord4419
ord3592
ord800
ord4155
ord540
ord324
ord2362
ord4229
ord384
ord1165
ord6051
ord1768
ord5286
ord3397
ord567
ord2127
ord2294
ord2858
ord6211
ord2371
ord755
ord470
ord1106
ord4219
ord2810
ord5871
ord4470
ord3087
ord4120
ord3810
ord2859
ord616
ord2430
ord6266
ord3909
ord4215
ord2576
ord3649
ord1637
ord861
ord5949
ord6195
ord2088
ord1634
ord3566
ord1143
ord858
ord3298
ord537
ord860
ord3282
ord2078
ord535
ord3995
ord2857
ord6004
ord6504
ord781
ord6759
ord3278
ord6130
ord3867
ord613
ord640
ord2444
ord2745
ord323
ord289
ord6132
ord1633
ord5781
ord2403
ord2015
ord4213
ord2570
ord4392
ord3577
ord6372
ord3703
ord1940
ord5299
ord4693
ord5285
ord5711
ord565
ord817
ord2718
ord4221
ord1197
ord765
ord4294
ord3693
ord807
ord554
ord5977
ord2550
ord3871
ord4127
ord3494
ord3170
ord2507
ord355
ord2634
ord6871
ord1172
ord6617
ord4158
ord3728
ord810
ord4266
ord6330
ord3292
ord3393
ord4270
ord538
ord542
ord668
ord2762
ord356
ord940
ord1262
ord6772
ord5597
ord924
ord3716
ord795
ord2385
ord5438
ord268
ord1560
ord6193
ord6451
ord5679
ord1941
ord2144
ord1230
ord3805
ord920
ord5446
ord6390
ord5436
ord6379
ord3092
ord3736
ord2248
ord4029
ord1938
ord3948
ord561
ord815
ord617
ord5208
ord296
ord6463
ord942
ord3442
ord3191
ord5499
ord1662
ord2644
ord3806
ord922
ord2813
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord4704
ord4992
ord4847
ord4370
ord5261
ord354
ord5180
ord3313
ord823
ord1971
ord665
ord3658
ord2406
ord3621
ord3568
ord818
ord686
ord641
ord1131
ord6433
ord2613
ord2506
ord825
ord4418
ord4616
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5303
ord4692
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord6733
ord4667
ord1569
msvcrt
memcpy
_strupr
_wfopen
_CxxThrowException
wcslen
__CxxFrameHandler
__set_app_type
_except_handler3
__dllonexit
_onexit
??1type_info@@UAE@XZ
_controlfp
_stricmp
wcscmp
strlen
sprintf
_ftol
strcmp
memset
strcpy
rand
srand
time
strcat
memcmp
_beginthreadex
wcscpy
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
kernel32
DeviceIoControl
GetVersionExW
TerminateThread
ResumeThread
Sleep
GetVersion
CreateThread
CloseHandle
EnterCriticalSection
LeaveCriticalSection
WritePrivateProfileStringW
InitializeCriticalSection
GetCurrentProcessId
OpenProcess
SetUnhandledExceptionFilter
InterlockedDecrement
LocalFree
LocalAlloc
FormatMessageW
GetModuleHandleW
GetStartupInfoW
CreateEventW
GlobalFree
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
LockResource
SizeofResource
FreeResource
LoadResource
FindResourceW
WaitForSingleObject
ResetEvent
SetEvent
GetCurrentThreadId
ExitThread
GlobalAddAtomW
ReleaseMutex
GetLastError
CreateMutexW
GlobalDeleteAtom
GlobalGetAtomNameW
WinExec
lstrlenW
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetCurrentProcess
user32
ReleaseDC
SetRect
MessageBoxW
CloseWindow
SetParent
GetWindowRect
GetKeyState
GetDC
IsWindow
GetParent
GetDesktopWindow
LoadIconW
LoadBitmapW
ScreenToClient
GetSysColor
SetWindowPos
ClientToScreen
CreatePopupMenu
GetCursorPos
GetForegroundWindow
GetMenuItemID
GetSubMenu
LoadMenuW
SetForegroundWindow
EnableWindow
AppendMenuW
GetSystemMenu
SendMessageW
GetSystemMetrics
DrawIcon
IsIconic
CopyRect
InvalidateRect
FillRect
wsprintfW
GetLastActivePopup
IsWindowVisible
BringWindowToTop
BroadcastSystemMessage
RegisterWindowMessageW
PostThreadMessageW
SetMenuDefaultItem
GetClientRect
SetTimer
ShowWindow
TrackPopupMenu
GetDlgItem
RedrawWindow
KillTimer
PostMessageW
GetWindowLongW
gdi32
SelectObject
DeleteDC
DeleteObject
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
BitBlt
advapi32
RegCreateKeyExW
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
AdjustTokenPrivileges
RegCloseKey
RegDeleteKeyW
RegFlushKey
shell32
Shell_NotifyIconW
comctl32
ImageList_Draw
ImageList_AddMasked
ImageList_GetImageInfo
ole32
CoCreateInstance
OleRun
OleUninitialize
CreateStreamOnHGlobal
OleCreateStaticFromData
ReleaseStgMedium
OleDuplicateData
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
OleSetContainedObject
OleInitialize
olepro32
ord251
oleaut32
GetErrorInfo
VariantCopy
VariantInit
VariantClear
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
winmm
waveOutWrite
waveOutPrepareHeader
waveOutClose
waveOutOpen
waveInOpen
waveInPrepareHeader
waveInStart
waveInReset
waveInUnprepareHeader
waveInClose
waveInAddBuffer
waveInStop
msvcp60
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1_Lockit@std@@QAE@XZ
psapi
GetModuleFileNameExW
ws2_32
gethostname
inet_ntoa
accept
listen
bind
htons
htonl
socket
gethostbyname
closesocket
setsockopt
recvfrom
WSAGetLastError
inet_addr
WSAStartup
gethostbyaddr
send
recv
connect
shutdown
sendto
Sections
.text Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 336KB - Virtual size: 332KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ