Static task
static1
Behavioral task
behavioral1
Sample
025d6473c4c41f4ccc768921b998b26928e4144f0dcb0bd6cf3aac2f257fbe18.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
025d6473c4c41f4ccc768921b998b26928e4144f0dcb0bd6cf3aac2f257fbe18.exe
Resource
win10v2004-20221111-en
General
-
Target
025d6473c4c41f4ccc768921b998b26928e4144f0dcb0bd6cf3aac2f257fbe18
-
Size
128KB
-
MD5
af65851ca32fb4ab04f6ae53d6422ec9
-
SHA1
f2a6d6bd3900b58ee95eb1666df4f65c3dbf206a
-
SHA256
025d6473c4c41f4ccc768921b998b26928e4144f0dcb0bd6cf3aac2f257fbe18
-
SHA512
25a2ff27ceb1ec1a9dfb9eff2a5b490ba0d6dd22964f0638410d6669bb5ebe9c620c1de0910461b977040353cf13a9ed48ddb26a5dbef2966647def2989960cc
-
SSDEEP
3072:0HpZAsYzyaO7AmeVuX/xxFSNXcSq0QMoJi2R1seepv:yflR7d+0vQXz4y2Ls
Malware Config
Signatures
Files
-
025d6473c4c41f4ccc768921b998b26928e4144f0dcb0bd6cf3aac2f257fbe18.exe windows x86
3ae7dd9cbf8a8c51d8f407758fe2c15a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetLocalTime
HeapAlloc
GetProcessHeap
VirtualProtect
IsBadReadPtr
HeapFree
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTickCount
GlobalMemoryStatusEx
GetSystemInfo
OpenEventA
SetErrorMode
ExitProcess
CreateMutexA
MoveFileA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
lstrcpyW
WinExec
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
Module32Next
Module32First
CreateRemoteThread
GetModuleHandleA
OpenProcess
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
CreateDirectoryA
GetLastError
DeleteFileA
SetFilePointer
WriteFile
LocalSize
LocalFree
GetFileAttributesA
CreateFileA
GetFileSize
ReadFile
LocalReAlloc
LocalAlloc
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
CreateEventA
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcpyA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
CancelIo
InterlockedExchange
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
Sleep
GetCurrentThreadId
user32
GetKeyState
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
mouse_event
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TranslateMessage
GetSystemMetrics
GetAsyncKeyState
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
PostThreadMessageA
GetInputState
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
ExitWindowsEx
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetForegroundWindow
GetWindowTextA
CharNextA
DispatchMessageA
wsprintfA
SetRect
GetMessageA
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
GetClipboardData
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
advapi32
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
StartServiceA
AbortSystemShutdownA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyA
CloseServiceHandle
ControlService
QueryServiceStatus
OpenServiceA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
msvcrt
sprintf
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_stricmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
_snprintf
_beginthreadex
??0exception@@QAE@ABQBD@Z
_mbscmp
_mbsstr
wcscpy
wcstombs
wcslen
mbstowcs
_errno
strncpy
strncmp
atoi
atol
strncat
realloc
exit
strrchr
_except_handler3
free
strcat
puts
strcmp
strcpy
malloc
strchr
_CxxThrowException
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
winmm
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutUnprepareHeader
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInGetNumDevs
waveOutPrepareHeader
waveOutClose
waveOutGetNumDevs
waveOutOpen
waveOutWrite
waveInOpen
ws2_32
accept
listen
sendto
recvfrom
__WSAFDIsSet
ioctlsocket
bind
ntohs
inet_addr
inet_ntoa
getsockname
WSAStartup
WSACleanup
send
closesocket
select
recv
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
getpeername
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
iphlpapi
GetIfTable
netapi32
NetUserSetInfo
NetUserDel
NetUserGetLocalGroups
NetApiBufferFree
NetUserGetInfo
NetUserEnum
NetLocalGroupAddMembers
NetUserAdd
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSLogoffSession
WTSDisconnectSession
WTSQuerySessionInformationA
WTSFreeMemory
WTSQuerySessionInformationW
WTSEnumerateSessionsA
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ