Static task
static1
Behavioral task
behavioral1
Sample
46a938a26aa871b773d1ae2416e3d583e6a234ae4935c409dead7a3d9e50f447.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
46a938a26aa871b773d1ae2416e3d583e6a234ae4935c409dead7a3d9e50f447.exe
Resource
win10v2004-20221111-en
General
-
Target
46a938a26aa871b773d1ae2416e3d583e6a234ae4935c409dead7a3d9e50f447
-
Size
108KB
-
MD5
94444fbbe2e3eed74cb1e8cee701c6e3
-
SHA1
9c06906acd9b0a2969f2865b22efcc1435b17533
-
SHA256
46a938a26aa871b773d1ae2416e3d583e6a234ae4935c409dead7a3d9e50f447
-
SHA512
df7fcc7d86a732d888c5c3a4ede43e275eeb18864723051e510600e11c0370381e6a09bed87f21000a8b52ebae2d3ff8161bd226c1bdee98a79037fd900371b6
-
SSDEEP
3072:dry13AbrB52mals9pMml9zqiUdjVbkHStZlRykDRRKpfOQOQu+f3H7PizOWi:dry1QZXuwx3l7UOWi
Malware Config
Signatures
Files
-
46a938a26aa871b773d1ae2416e3d583e6a234ae4935c409dead7a3d9e50f447.exe windows x86
e58f984c972c6c864581599fc01fc933
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
_onexit
_lock
__dllonexit
_unlock
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
strstr
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_decode_pointer
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
calloc
malloc
free
strcspn
strncpy
srand
strchr
_beginthreadex
_invoke_watson
_initterm_e
atoi
strncmp
rand
printf
strtok
exit
??_U@YAPAXI@Z
??_V@YAXPAX@Z
sprintf
??0exception@std@@QAE@ABV01@@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
memset
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler3
??3@YAXPAX@Z
memmove
memcpy
ceil
_controlfp_s
kernel32
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
GetCurrentProcessId
CreateThread
SetThreadPriority
SetErrorMode
OpenEventA
ExitProcess
CopyFileA
lstrlenA
GetSystemDefaultUILanguage
GetVersionExA
GetPrivateProfileStringA
DeleteFileA
CreateProcessA
GetCurrentProcess
OutputDebugStringA
TerminateThread
lstrcpyA
SetFilePointer
WriteFile
GetTempPathA
GetTickCount
WritePrivateProfileStringA
CreateFileA
ResetEvent
GetLastError
LoadLibraryA
InitializeCriticalSection
Sleep
DeleteCriticalSection
VirtualFree
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
CreateEventA
WaitForSingleObject
SetEvent
InterlockedExchange
CancelIo
CloseHandle
GetProcAddress
FreeLibrary
user32
wsprintfA
ExitWindowsEx
MessageBoxA
advapi32
SetServiceStatus
OpenSCManagerA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
StartServiceA
RegOpenKeyA
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
shell32
ShellExecuteA
ws2_32
WSAIoctl
htons
gethostbyname
socket
select
inet_addr
inet_ntoa
sendto
htonl
WSASocketA
gethostname
recv
WSACleanup
send
setsockopt
closesocket
WSAStartup
connect
msvcp80
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.5521 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE