Static task
static1
Behavioral task
behavioral1
Sample
0bf844465dbd1242b1d0ab78ff56d01f375db08c7655403269bcbee93c3ead96.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0bf844465dbd1242b1d0ab78ff56d01f375db08c7655403269bcbee93c3ead96.exe
Resource
win10v2004-20220812-en
General
-
Target
0bf844465dbd1242b1d0ab78ff56d01f375db08c7655403269bcbee93c3ead96
-
Size
156KB
-
MD5
455068e0444107ee5fb993f34a184e03
-
SHA1
3ac1fbc4fec45cfc3102d03a37fb7c5a71bb7b80
-
SHA256
0bf844465dbd1242b1d0ab78ff56d01f375db08c7655403269bcbee93c3ead96
-
SHA512
6937cc5cf004236cbea52f4517b9f18c00086e60b39903053bdef78e5f7d4da166cbfc0774b516d272d01b9832062d347317a49d492ef2be521cd7b2a517a97c
-
SSDEEP
3072:EBKYpyDgOmr1rHhO9WkOlrmqF63pHtefXuvT9a0mqF63pHtefXuvT9a:HVmrxhOJmmqFspHtefXurvmqFspHtefS
Malware Config
Signatures
Files
-
0bf844465dbd1242b1d0ab78ff56d01f375db08c7655403269bcbee93c3ead96.exe windows x86
c9b89b537b9cf11eabdd01dcc3ce239a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadPriority
CreateThread
WaitForSingleObject
CloseHandle
TerminateThread
InitializeCriticalSection
GlobalMemoryStatusEx
GetVersionExA
Module32Next
Module32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
Process32Next
Process32First
OpenEventA
GetLastError
CreateEventA
SetEvent
ResetEvent
CopyFileA
GetCurrentProcessId
GetWindowsDirectoryA
ResumeThread
InterlockedExchange
GetFileAttributesA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
ReadFile
SetEndOfFile
GetOEMCP
GetACP
GetCommandLineA
ExitProcess
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
WinExec
DeleteFileA
ExitThread
GetCurrentDirectoryA
GetModuleFileNameA
Sleep
lstrlenA
GetCPInfo
CreateFileA
FlushFileBuffers
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RtlUnwind
HeapReAlloc
GetStartupInfoA
GetVersion
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
DeleteCriticalSection
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
WriteFile
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetStdHandle
ws2_32
htonl
htons
select
__WSAFDIsSet
getsockopt
gethostbyname
getsockname
closesocket
WSACleanup
WSAStartup
inet_addr
setsockopt
socket
connect
send
recv
ntohl
ntohs
sendto
advapi32
RegisterServiceCtrlHandlerA
CreateServiceA
RegOpenKeyA
StartServiceCtrlDispatcherA
SetServiceStatus
ControlService
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
StartServiceA
RegSetValueExA
RegFlushKey
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
iphlpapi
GetIfTable
GetAdaptersInfo
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE