Static task
static1
Behavioral task
behavioral1
Sample
775985a378412adfc4345f294ae62501ad21a17ef71d99906e38d265cba2a877.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
775985a378412adfc4345f294ae62501ad21a17ef71d99906e38d265cba2a877.exe
Resource
win10v2004-20220812-en
General
-
Target
775985a378412adfc4345f294ae62501ad21a17ef71d99906e38d265cba2a877
-
Size
140KB
-
MD5
9c93abd0b99766486fd5dc45fedeb1f8
-
SHA1
812fb56f87f925d58f867c13b1cd146c69b96e8f
-
SHA256
775985a378412adfc4345f294ae62501ad21a17ef71d99906e38d265cba2a877
-
SHA512
e567341eac548c0b083ea352456730cafab28641514a1e83b05cc0f007744828515999c3c85d1be8994738eaa0051601f7cb57033618d5294361ddc1eb0936e0
-
SSDEEP
1536:8Wowylr2EcY0QCjJG4gV1+m01BFu1ZmCN2RIcxd7mada3V0qmuxOTmqrM3:8BtbpSJG4gVV042RIsd7bda3VVxOjg3
Malware Config
Signatures
Files
-
775985a378412adfc4345f294ae62501ad21a17ef71d99906e38d265cba2a877.exe windows x86
0152fa618f26ed66fc2cc872ef87f12b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnmapViewOfFile
CreateFileA
VirtualQueryEx
GetCurrentProcess
MapViewOfFile
CreateFileMappingA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
ReadFile
CloseHandle
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
FreeLibrary
GetProcAddress
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetSystemInfo
IsDebuggerPresent
OutputDebugStringA
SetFilePointerEx
GetVersionExA
GetStartupInfoA
GetModuleHandleA
ExitProcess
GetSystemTimeAsFileTime
user32
FindWindowA
SendMessageA
MessageBoxA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegQueryValueA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?_Nomemory@std@@YAXXZ
msvcr71
_snprintf
__CxxFrameHandler
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
??3@YAXPAX@Z
??1exception@@UAE@XZ
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
_CxxThrowException
??_V@YAXPAX@Z
strchr
free
strrchr
malloc
_callnewh
__security_error_handler
_except_handler3
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.2rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE