Static task
static1
Behavioral task
behavioral1
Sample
499972795a8d417d43543ff4a2f6f17232b9b25a1f71d01f7d08e6a7a15a6408.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
499972795a8d417d43543ff4a2f6f17232b9b25a1f71d01f7d08e6a7a15a6408.exe
Resource
win10v2004-20220812-en
General
-
Target
499972795a8d417d43543ff4a2f6f17232b9b25a1f71d01f7d08e6a7a15a6408
-
Size
182KB
-
MD5
f0d965e7fb9f45e55f0ff3fcce00aed4
-
SHA1
a72cfdec459f1bfde2c5a002e7f9ec4c0bf5d28e
-
SHA256
499972795a8d417d43543ff4a2f6f17232b9b25a1f71d01f7d08e6a7a15a6408
-
SHA512
b40004aeac312e6bd397c01c61d8efe6b85af01988a2d1baa62d9b3aa6a717fc0bcc8961b2436d92ea04a57f6606435b2686f31d402da459e7a7beac43a7ce86
-
SSDEEP
3072:caD+MbqDhzPKdjup2i7l6tWR37ORD9CHhAXVGXkf5SBxz8rCkxYGzh6UiUAvHizW:6h7Kd0B6LukkX0C4OOYUEUmGgxqT/OzF
Malware Config
Signatures
Files
-
499972795a8d417d43543ff4a2f6f17232b9b25a1f71d01f7d08e6a7a15a6408.exe windows x86
4f87983360d5b9989c58d75449aa0c65
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_controlfp_s
_invoke_watson
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_strnicmp
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
calloc
_snprintf
_beginthreadex
atol
mbstowcs
wcstombs
_errno
sprintf
strncmp
atoi
realloc
strncat
srand
rand
printf
_time64
strncpy
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
strrchr
??_U@YAPAXI@Z
free
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
malloc
strchr
memmove
ceil
strstr
_CxxThrowException
memcpy
__CxxFrameHandler3
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
shlwapi
SHDeleteKeyA
kernel32
SetEvent
GetProcAddress
LoadLibraryA
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
CancelIo
TerminateThread
GetPrivateProfileSectionNamesA
lstrcatA
lstrcpyA
GetWindowsDirectoryA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
DeleteFileA
GetFileSize
CreateFileA
WriteFile
CloseHandle
MoveFileA
ReadFile
GetModuleFileNameA
SetLastError
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
ExitThread
GetTickCount
ExitProcess
GetSystemDirectoryA
GetLocalTime
HeapFree
HeapAlloc
GetProcessHeap
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetStartupInfoA
CreatePipe
GlobalMemoryStatus
GetSystemInfo
OpenEventA
SetErrorMode
CreateMutexA
lstrcpyW
GlobalMemoryStatusEx
WinExec
Process32Next
lstrcmpiA
Process32First
Module32First
GetModuleHandleA
GetCurrentThreadId
InterlockedCompareExchange
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
CreateEventA
GetCurrentProcess
Sleep
SetFilePointer
lstrlenA
user32
OpenClipboard
CloseClipboard
SetCapture
GetSystemMetrics
DestroyCursor
LoadCursorA
GetCursorInfo
GetUserObjectInformationA
ReleaseDC
GetDesktopWindow
SetRect
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
ExitWindowsEx
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetThreadDesktop
OpenDesktopA
DispatchMessageA
PostMessageA
CloseWindow
SendMessageA
IsWindow
CreateWindowExA
WindowFromPoint
TranslateMessage
GetMessageA
wsprintfA
CharNextA
GetDC
GetWindowTextA
GetForegroundWindow
gdi32
GetDIBits
SelectObject
CreateDIBSection
DeleteDC
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
advapi32
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
CreateServiceA
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
RegRestoreKeyA
RegSaveKeyA
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
EnumServicesStatusA
ChangeServiceConfig2A
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
winmm
waveInStop
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInAddBuffer
waveInReset
waveInStart
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutClose
waveInUnprepareHeader
waveInClose
waveOutReset
waveOutWrite
waveOutUnprepareHeader
ws2_32
gethostbyname
sendto
inet_addr
connect
WSAIoctl
select
recv
send
setsockopt
closesocket
WSAStartup
ioctlsocket
listen
accept
getpeername
__WSAFDIsSet
recvfrom
bind
ntohs
getsockname
WSAGetLastError
WSACleanup
htonl
gethostname
inet_ntoa
htons
WSASocketA
socket
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrameStart
ICOpen
ICSeqCompressFrame
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
iphlpapi
GetIfTable
netapi32
NetUserAdd
NetApiBufferFree
NetUserEnum
NetUserGetLocalGroups
NetUserGetInfo
NetUserSetInfo
NetLocalGroupAddMembers
NetUserDel
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSQuerySessionInformationW
WTSEnumerateSessionsA
WTSLogoffSession
WTSDisconnectSession
WTSFreeMemory
WTSQuerySessionInformationA
Sections
BBB Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
AAA Size: 1024B - Virtual size: 947B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.BUFF Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.6652 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
QQQ Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ