Static task
static1
Behavioral task
behavioral1
Sample
a65d8777b99011aef2ff420419200daa94e8d5941c62b927930c275f6aee4710.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a65d8777b99011aef2ff420419200daa94e8d5941c62b927930c275f6aee4710.exe
Resource
win10v2004-20220812-en
General
-
Target
a65d8777b99011aef2ff420419200daa94e8d5941c62b927930c275f6aee4710
-
Size
79KB
-
MD5
5285159dbddddd5f11b540e47bf8a22b
-
SHA1
1b29522060ef652bb9943220b30e950dd7e3d00d
-
SHA256
a65d8777b99011aef2ff420419200daa94e8d5941c62b927930c275f6aee4710
-
SHA512
b39d17f43bf7991f2c805c5edb0c1d72511d5d41aeb91fa7ce6d0c19aafb5ea4bf1feb5343b555a4d8d5532ded0f0c4df09dbba1ca866d18d105be67e64652bb
-
SSDEEP
1536:9c2ijkPkSU57oJdIEMa8KN8E1r3JctN1s:9cei0B3JctNe
Malware Config
Signatures
Files
-
a65d8777b99011aef2ff420419200daa94e8d5941c62b927930c275f6aee4710.exe windows x86
b132db55cb9099a95dc47d34498c6067
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
getsockname
gethostbyname
WSAStartup
setsockopt
bind
listen
accept
WSACleanup
inet_addr
shutdown
send
recv
inet_ntoa
socket
htons
ioctlsocket
connect
select
closesocket
ntohl
htonl
shell32
SHGetFolderPathA
advapi32
GetUserNameA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
kernel32
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
GetStdHandle
SetHandleCount
HeapReAlloc
VirtualAlloc
VirtualFree
SetStdHandle
FlushFileBuffers
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
GetFileType
MultiByteToWideChar
HeapCreate
HeapDestroy
ReadFile
GetVersion
CloseHandle
GetCurrentProcess
FindClose
FindFirstFileA
ExitThread
DeleteFileA
SetFileAttributesA
TerminateProcess
OpenProcess
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetWindowsDirectoryA
GetSystemDirectoryA
Sleep
GlobalFree
GlobalAlloc
UnmapViewOfFile
lstrlenA
MapViewOfFile
CreateFileMappingA
SetFilePointer
WriteFile
GetFileSize
CreateFileA
CopyFileA
GetProcAddress
LoadLibraryA
SetEndOfFile
SetFileTime
GetFileTime
FindNextFileA
lstrcatA
GetFullPathNameA
SetCurrentDirectoryA
GetDriveTypeA
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
CreateThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
ExitProcess
CreateProcessA
WaitForSingleObject
CreateMutexA
SetErrorMode
GetTempPathA
GetLastError
CreateDirectoryA
GetVersionExA
TerminateThread
ExpandEnvironmentStringsA
GetFileAttributesA
GetModuleHandleA
GetCommandLineA
GetStartupInfoA
HeapFree
HeapAlloc
user32
CharLowerA
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE