Static task
static1
Behavioral task
behavioral1
Sample
d2a8fcf002eca214aa764eb80560e13729e00e03499838e17ee8c0226d366cae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2a8fcf002eca214aa764eb80560e13729e00e03499838e17ee8c0226d366cae.exe
Resource
win10v2004-20220812-en
General
-
Target
d2a8fcf002eca214aa764eb80560e13729e00e03499838e17ee8c0226d366cae
-
Size
88KB
-
MD5
2488a8ea7e3674c95af7a1aa76f144b0
-
SHA1
683827948d9d544a98752bfad9aa17d4eb92e5a0
-
SHA256
d2a8fcf002eca214aa764eb80560e13729e00e03499838e17ee8c0226d366cae
-
SHA512
ea7689ae3fd98603ea8dc773986387b7aeafbea514272ec6a47328fd9d551da39fff02def65ffc45224df1867673fa8f2ebaddab9ac70d9b53c2769be18b9c14
-
SSDEEP
1536:k71VZy3whZL5Wz9o9IqscMr4fibeJGrx:G1VZy3ilWz9NqszriibeJGrx
Malware Config
Signatures
Files
-
d2a8fcf002eca214aa764eb80560e13729e00e03499838e17ee8c0226d366cae.exe windows x86
a108e51c4ab2f3d205af475ba66b3b78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
??3@YAXPAX@Z
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
time
strrchr
rand
atoi
exit
strcpy
free
strcat
strlen
realloc
_except_handler3
malloc
memcmp
??2@YAPAXI@Z
memset
memmove
_CxxThrowException
_ftol
__CxxFrameHandler
ceil
memcpy
_strrev
kernel32
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
GetCurrentThreadId
GetModuleFileNameA
DefineDosDeviceA
MoveFileExA
SetFileAttributesA
CreateDirectoryA
ExitProcess
CreateMutexA
OpenEventA
GetVersionExA
GetSystemInfo
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
GetModuleHandleA
GetProcessHeap
HeapAlloc
GetCurrentProcess
GetLastError
LoadLibraryA
GetProcAddress
DeleteFileA
InitializeCriticalSection
VirtualFree
Sleep
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateEventA
WaitForSingleObject
SetEvent
InterlockedExchange
CancelIo
ResetEvent
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
GetFileAttributesA
CreateProcessA
lstrlenA
lstrcpyA
TerminateThread
lstrcatA
GetTickCount
GetDriveTypeA
user32
CloseDesktop
LoadIconA
LoadCursorA
SetThreadDesktop
PostThreadMessageA
GetInputState
GetMessageA
wsprintfA
GetUserObjectInformationA
OpenInputDesktop
GetThreadDesktop
RegisterClassA
OpenDesktopA
gdi32
GetStockObject
advapi32
LookupPrivilegeValueA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
connect
htons
gethostbyname
socket
WSAIoctl
gethostname
getsockname
send
WSAStartup
select
setsockopt
WSACleanup
closesocket
recv
iphlpapi
GetIfTable
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
Sections
PAGE Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ