Static task
static1
Behavioral task
behavioral1
Sample
bdc54e5b06a870669dc7647a213d580f054d069a5a0dec36b2ed31cb4de11b1b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdc54e5b06a870669dc7647a213d580f054d069a5a0dec36b2ed31cb4de11b1b.exe
Resource
win10v2004-20220812-en
General
-
Target
bdc54e5b06a870669dc7647a213d580f054d069a5a0dec36b2ed31cb4de11b1b
-
Size
72KB
-
MD5
7d4c40a7c5d72f3bf1c7ec3adf2ea2e3
-
SHA1
7137fc0b48f6d717ac3353cec40cd8e1208e2c36
-
SHA256
bdc54e5b06a870669dc7647a213d580f054d069a5a0dec36b2ed31cb4de11b1b
-
SHA512
06929f5e9d5a4eb349165a516b82be8984a0a60833ca980464bc2b8d820faf8326a7ae993f9f9648934b8bcf404dafcccc363522ee240b9bf1b99be390f21c07
-
SSDEEP
1536:qjcCovzv8t9peiM93DT/clYdQcUssAgKw0:LCozq9ja3XEbcUrKw
Malware Config
Signatures
Files
-
bdc54e5b06a870669dc7647a213d580f054d069a5a0dec36b2ed31cb4de11b1b.exe windows x86
32f6b10910a16015ec1adbc19118d46a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
accept
gethostname
gethostbyname
WSACleanup
send
bind
setsockopt
htons
htonl
socket
closesocket
listen
recv
shutdown
ioctlsocket
WSAStartup
mfc42
ord1979
ord5572
ord2915
ord5442
ord3318
ord5186
ord354
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord815
ord561
ord641
ord6117
ord2621
ord1134
ord2725
ord665
ord4998
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord1146
ord324
ord4234
ord5953
ord1779
ord5951
ord3521
ord4710
ord6453
ord4220
ord2584
ord3654
ord2438
ord6270
ord2863
ord1644
ord3663
ord6215
ord2645
ord6403
ord3097
ord4055
ord1576
ord3095
ord5232
ord1567
ord2393
ord6197
ord5718
ord3797
ord2147
ord2864
ord1180
ord268
ord1568
ord5268
ord2818
ord6374
ord2642
ord3092
ord940
ord858
ord540
ord860
ord941
ord539
ord939
ord537
ord6877
ord3522
ord924
ord922
ord800
ord1168
ord823
ord825
ord5265
ord6402
msvcrt
_onexit
__dllonexit
strrchr
_purecall
strstr
sscanf
??1type_info@@UAE@XZ
atoi
wcscmp
strncmp
strncpy
__CxxFrameHandler
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_controlfp
_setmbcp
_except_handler3
__set_app_type
_initterm
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
isdigit
_strnicmp
_itoa
_strlwr
_CxxThrowException
kernel32
LocalFree
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SetCurrentDirectoryA
GetProcAddress
LoadLibraryA
lstrlenA
lstrcmpA
lstrcmpiA
Sleep
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
CreateThread
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
GetLastError
CreateMutexA
FreeLibrary
user32
SetForegroundWindow
GetSubMenu
GetCursorPos
RegisterWindowMessageA
LoadIconA
LoadMenuA
IsWindowVisible
SetActiveWindow
GetActiveWindow
EnableWindow
MessageBoxA
SetMenuDefaultItem
IsWindowEnabled
SendMessageA
advapi32
RegQueryValueExA
RegSetValueExA
RegOpenKeyA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
OleRun
oleaut32
SysAllocString
SysFreeString
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xlen@std@@YAXXZ
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE