Static task
static1
Behavioral task
behavioral1
Sample
91937461f811d35bb47a42c362cd76adc93f5e4d70c6634710d2fa0eff146ee2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91937461f811d35bb47a42c362cd76adc93f5e4d70c6634710d2fa0eff146ee2.exe
Resource
win10v2004-20220812-en
General
-
Target
91937461f811d35bb47a42c362cd76adc93f5e4d70c6634710d2fa0eff146ee2
-
Size
29KB
-
MD5
a58e625c2ea38c4d92590faf2f5f0b37
-
SHA1
2d80061d177bf84904d4934729cea13386d7b54b
-
SHA256
91937461f811d35bb47a42c362cd76adc93f5e4d70c6634710d2fa0eff146ee2
-
SHA512
b300a33c66dec3ae2f45a96c7d13e0fdfd61d521a707bfa23d72146bd54b94012fa328a808686294fc2af9644e7d79c20220d935272d81143b437025e6649d06
-
SSDEEP
384:x2pVGbBXbiUQ4Q9G3qz9nvO1R5XnisuwwBgpzwVhN2VjqnW4tsj8FloOOuK+Yy+q:ApeXbyBnvk5XtQN2VjX4tk8FIy+q
Malware Config
Signatures
Files
-
91937461f811d35bb47a42c362cd76adc93f5e4d70c6634710d2fa0eff146ee2.exe windows x86
3766005650ea0b17ad97bf33852590e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
ExitProcess
GetLastError
CreateMutexA
SetPriorityClass
CopyFileA
GetSystemDirectoryA
GlobalMemoryStatusEx
GetComputerNameA
GetSystemDefaultUILanguage
GetModuleHandleA
TerminateProcess
ExitThread
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
WaitForSingleObject
GetTempPathA
LoadLibraryA
GetProcAddress
WinExec
OpenMutexA
ReleaseMutex
CloseHandle
CreateThread
lstrlenA
Sleep
GetStartupInfoA
GetTickCount
user32
GetDesktopWindow
wsprintfA
advapi32
CreateServiceA
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
RegCloseKey
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
DeleteService
RegQueryValueExA
shell32
ShellExecuteA
ws2_32
select
__WSAFDIsSet
recv
send
WSAIoctl
htons
socket
connect
WSAStartup
setsockopt
closesocket
gethostbyname
inet_addr
sendto
WSASocketA
htonl
msvcrt
rand
_initterm
_controlfp
??1type_info@@UAE@XZ
??3@YAXPAX@Z
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
realloc
malloc
atoi
strncpy
strcspn
strstr
exit
sprintf
localtime
time
strncmp
_except_handler3
__getmainargs
__CxxFrameHandler
_CxxThrowException
_exit
_XcptFilter
_acmdln
__setusermatherr
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE