Static task
static1
Behavioral task
behavioral1
Sample
a5a596c075c04089ce2ebf46f1880cf5261d5e82e0d486e9f412df8d5800d3cd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a5a596c075c04089ce2ebf46f1880cf5261d5e82e0d486e9f412df8d5800d3cd.exe
Resource
win10v2004-20220812-en
General
-
Target
a5a596c075c04089ce2ebf46f1880cf5261d5e82e0d486e9f412df8d5800d3cd
-
Size
152KB
-
MD5
186299e7ddd9d731d9e43407f90ac321
-
SHA1
b11254abc3c2c2420b73f0f99e57de2f0f6a2851
-
SHA256
a5a596c075c04089ce2ebf46f1880cf5261d5e82e0d486e9f412df8d5800d3cd
-
SHA512
a0a5f47d03855ac1f13eb95060b3f7b1a5fc54696094bcc55f48728e5dc53eacd10d1db0ebff76a5e784e58cc4e81959aa0534aa9462c4f1207fde37c8973796
-
SSDEEP
3072:pYjdJKvmC0kFmQkQhA8huFUg0xg0fg1TWMKuEcUBe1LHeo:p90kDBAcqUrxgCF3BaHeo
Malware Config
Signatures
Files
-
a5a596c075c04089ce2ebf46f1880cf5261d5e82e0d486e9f412df8d5800d3cd.exe windows x86
4896afc2c5ef39b79df9e0e178f60b13
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
msvcrt
strstr
__CxxFrameHandler
memset
??2@YAPAXI@Z
memcmp
strlen
free
malloc
_except_handler3
strrchr
strcmp
strcpy
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
_strnicmp
__getmainargs
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_strcmpi
_acmdln
_XcptFilter
_exit
calloc
_beginthreadex
sprintf
realloc
strncat
exit
rand
_errno
strncmp
strchr
atoi
wcscpy
strncpy
strcat
kernel32
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
VirtualFree
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetProcAddress
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
CreateRemoteThread
VirtualAllocEx
FreeLibrary
OpenProcess
MultiByteToWideChar
CreateThread
TerminateThread
GetTickCount
WinExec
OutputDebugStringA
GetModuleFileNameA
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
ExitProcess
GetWindowsDirectoryA
GetLocalTime
lstrcmpA
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
InitializeCriticalSection
SetLastError
lstrcatA
user32
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
CharNextA
wsprintfA
LoadCursorA
DestroyCursor
SendMessageA
SystemParametersInfoA
MapVirtualKeyA
SetCapture
WindowFromPoint
mouse_event
CloseClipboard
SetClipboardData
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
GetWindowTextA
SetCursorPos
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
CreateCompatibleBitmap
GetDIBits
advapi32
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
OpenProcessToken
LookupPrivilegeValueA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegEnumKeyExA
AllocateAndInitializeSid
GetLengthSid
GetTokenInformation
LookupAccountSidA
CreateServiceA
RegDeleteValueA
RegDeleteKeyA
InitializeAcl
RegEnumValueA
ws2_32
listen
accept
sendto
bind
getsockname
recvfrom
__WSAFDIsSet
WSAGetLastError
gethostname
getpeername
inet_addr
inet_ntoa
send
select
recv
ntohs
closesocket
socket
gethostbyname
htons
connect
WSAStartup
WSACleanup
setsockopt
WSAIoctl
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
netapi32
NetLocalGroupAddMembers
NetUserAdd
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICSendMessage
ICClose
ICSeqCompressFrameEnd
ICOpen
ICSeqCompressFrameStart
ICSeqCompressFrame
ICCompressorFree
iphlpapi
GetIfTable
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE