Static task
static1
Behavioral task
behavioral1
Sample
7a14cbc3e69f39cb82cddfb672d9e09108e4e9869c23b9ac787c7d1099dd65df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a14cbc3e69f39cb82cddfb672d9e09108e4e9869c23b9ac787c7d1099dd65df.exe
Resource
win10v2004-20221111-en
General
-
Target
7a14cbc3e69f39cb82cddfb672d9e09108e4e9869c23b9ac787c7d1099dd65df
-
Size
60KB
-
MD5
1bba548e33e682b18b966eb16fa26a3f
-
SHA1
e77f71a5f0f4cf8858d6f77410b95eb0d21571f3
-
SHA256
7a14cbc3e69f39cb82cddfb672d9e09108e4e9869c23b9ac787c7d1099dd65df
-
SHA512
eef83b69b121277100be4ff6faf89d376a8d91f01a95797550862fa360d5b84c88baecda08df6aacc7725a2af289ea7a79abd34526fc8a9c889c04a0deacbb0e
-
SSDEEP
768:gDz+f3OZs3HkWqO+21QVW/JZUybt/FnToIf1K9Mu+p9vx6N:g2f3j3H7qO9QVW/4kFnToIff90N
Malware Config
Signatures
Files
-
7a14cbc3e69f39cb82cddfb672d9e09108e4e9869c23b9ac787c7d1099dd65df.exe windows x86
d88137238d6cdfcb42a1ae4ed6513ddf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
CreateThread
GetTickCount
SetThreadPriority
GetCurrentThread
WriteFile
CreateFileA
GetFileSize
lstrcpyA
GlobalMemoryStatusEx
GetComputerNameA
ResumeThread
SetFileAttributesA
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
lstrlenA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
Module32First
GetPriorityClass
Process32Next
OpenProcess
TerminateProcess
GetCurrentProcess
GetTempPathA
WinExec
LoadLibraryA
GetProcAddress
FreeLibrary
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
CreatePipe
Sleep
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
SetPriorityClass
GetModuleHandleA
user32
ExitWindowsEx
mouse_event
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
keybd_event
SetCursorPos
wsprintfA
gdi32
CreateCompatibleBitmap
GetDIBits
CreateDCA
DeleteDC
CreateCompatibleDC
BitBlt
DeleteObject
SelectObject
advapi32
AdjustTokenPrivileges
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegDeleteValueA
RegOpenKeyA
SetServiceStatus
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
free
malloc
srand
strstr
strncat
strncpy
sprintf
printf
??2@YAPAXI@Z
__CxxFrameHandler
_ftol
exit
rand
strncmp
_except_handler3
strcspn
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
ws2_32
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
closesocket
connect
socket
htons
shutdown
sendto
WSASocketA
htonl
WSAIoctl
urlmon
URLDownloadToFileA
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE