Static task
static1
Behavioral task
behavioral1
Sample
57c4e1ef1ae2407b28a23cd2f3ec348f0df2f336505ed9e41a5f0efc1773cce4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57c4e1ef1ae2407b28a23cd2f3ec348f0df2f336505ed9e41a5f0efc1773cce4.exe
Resource
win10v2004-20220812-en
General
-
Target
57c4e1ef1ae2407b28a23cd2f3ec348f0df2f336505ed9e41a5f0efc1773cce4
-
Size
72KB
-
MD5
b4f4052c46f5698ff59084ec174e4766
-
SHA1
ee0bb822d0e8290514e7af47500f8c949a7e316b
-
SHA256
57c4e1ef1ae2407b28a23cd2f3ec348f0df2f336505ed9e41a5f0efc1773cce4
-
SHA512
fb6bc7294624019c7f47b37648a1e67b952ca6189cb3b03373236070c2c567e27a0186e9c40ac7b22e645e705d487cf3193358ec6363d1b9a7108aab6e9bf524
-
SSDEEP
1536:og8auY14kV3081HccZr3fbZcyb6NGfhce:oggYykV3081HcSrvbZcY6NGfhc
Malware Config
Signatures
Files
-
57c4e1ef1ae2407b28a23cd2f3ec348f0df2f336505ed9e41a5f0efc1773cce4.exe windows x86
de504919049ef6b24ab889fa25b65a1e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_strrev
ceil
_stricmp
_strnicmp
??1type_info@@UAE@XZ
calloc
_beginthreadex
atoi
strchr
strncat
free
realloc
time
srand
rand
malloc
strrchr
_except_handler3
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
??3@YAXPAX@Z
memmove
strstr
_ftol
kernel32
InterlockedExchange
CancelIo
lstrcpyA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
SetEvent
lstrlenA
ReadFile
GetModuleFileNameA
GetLastError
GetWindowsDirectoryA
GetFileAttributesA
CreateProcessA
GetCurrentProcess
ExitThread
CreateThread
GetTickCount
TerminateThread
GetProcAddress
LoadLibraryA
ExitProcess
HeapAlloc
GetProcessHeap
VirtualProtect
IsBadReadPtr
HeapFree
FreeLibrary
lstrcatA
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
SetErrorMode
GetCurrentThreadId
ResetEvent
WaitForSingleObject
CreateEventA
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
Sleep
GetFileSize
user32
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
wsprintfA
MessageBoxA
SetProcessWindowStation
ExitWindowsEx
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyExA
RegEnumValueA
RegDeleteValueA
ws2_32
send
sendto
htons
WSASocketA
inet_ntoa
closesocket
htonl
WSAGetLastError
getsockname
select
recv
socket
gethostname
gethostbyname
WSAStartup
WSAIoctl
setsockopt
connect
inet_addr
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
Sections
BBV Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
KKK Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ