Static task
static1
Behavioral task
behavioral1
Sample
feaa52a960ae7427a9a2d140ee9bfff97338bc4ad7459a0a0c9401e6ac6cd9a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
feaa52a960ae7427a9a2d140ee9bfff97338bc4ad7459a0a0c9401e6ac6cd9a7.exe
Resource
win10v2004-20221111-en
General
-
Target
feaa52a960ae7427a9a2d140ee9bfff97338bc4ad7459a0a0c9401e6ac6cd9a7
-
Size
84KB
-
MD5
2e5f7b947058fe689aed7474f7494f8f
-
SHA1
69f8c486f7c120d3e6809adc538adab553d300ea
-
SHA256
feaa52a960ae7427a9a2d140ee9bfff97338bc4ad7459a0a0c9401e6ac6cd9a7
-
SHA512
651fd378911e7ce289cea3f4c1c24576c8ca78ae225bb490ddb75f2d067d0f08ddbe4539d73e8648ea87fed753a4cf2470a4e55b69f5ba1fc1499e4c194e7b1d
-
SSDEEP
1536:scTUcsR4MmofqTrNADJvHRcsg0Wfs4+HcmD:scTutvHRbg0As4+HcmD
Malware Config
Signatures
Files
-
feaa52a960ae7427a9a2d140ee9bfff97338bc4ad7459a0a0c9401e6ac6cd9a7.exe windows x86
5812f6cd6cd17302cc81dcf0cda09d28
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord825
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__CxxFrameHandler
_CxxThrowException
memmove
_ftol
malloc
_except_handler3
realloc
free
exit
atoi
rand
sprintf
strncmp
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
_acmdln
__getmainargs
__setusermatherr
_initterm
kernel32
MoveFileExA
CreateThread
GetStartupInfoA
ExitProcess
CopyFileA
GetCurrentThreadId
GetProcAddress
LoadLibraryA
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
InterlockedExchange
CancelIo
Sleep
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
VirtualAlloc
GetFileAttributesA
CreateProcessA
lstrlenA
lstrcpyA
TerminateThread
lstrcatA
GetTickCount
DeleteFileA
GetLastError
GetCurrentProcess
HeapAlloc
GetProcessHeap
GetModuleHandleA
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
OpenEventA
CreateMutexA
GetModuleFileNameA
MoveFileA
user32
SetThreadDesktop
CloseDesktop
LoadIconA
LoadCursorA
RegisterClassA
PostThreadMessageA
GetInputState
GetMessageA
GetUserObjectInformationA
GetWindow
FindWindowA
FindWindowExA
SendMessageA
GetDlgCtrlID
PostMessageA
SendInput
wsprintfA
GetThreadDesktop
OpenDesktopA
OpenInputDesktop
ShowWindow
gdi32
GetStockObject
advapi32
StartServiceCtrlDispatcherA
OpenEventLogA
CloseEventLog
OpenSCManagerA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
StartServiceA
CloseServiceHandle
RegOpenKeyExA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
ClearEventLogA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
gethostbyname
socket
closesocket
send
WSACleanup
gethostname
getsockname
recv
select
WSAStartup
setsockopt
connect
htons
iphlpapi
GetIfTable
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
SysFreeString
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ