Static task
static1
Behavioral task
behavioral1
Sample
ed989d9d7e04a312dffe2fdd8dd30273d5b07ee56941f1a724b6143752ef42da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed989d9d7e04a312dffe2fdd8dd30273d5b07ee56941f1a724b6143752ef42da.exe
Resource
win10v2004-20221111-en
General
-
Target
ed989d9d7e04a312dffe2fdd8dd30273d5b07ee56941f1a724b6143752ef42da
-
Size
76KB
-
MD5
145c9edca1151d477e5c339b6d797cbd
-
SHA1
f09d773d50f87c47500305e79bc1e6fcf503ebd6
-
SHA256
ed989d9d7e04a312dffe2fdd8dd30273d5b07ee56941f1a724b6143752ef42da
-
SHA512
10f5d6cacbbc96fa22c097f5b519fe1738a5531820518af00cedf8ca9112808bc2c2871845f85f496a1d08695441262ab3ed57068e6d029ec1e5aabdb32d47df
-
SSDEEP
1536:bcPk2vG+Yq6GrXdOOq52m0HLxEulgsteEY+cZv8FYOicNx1q/6:v2vGM6GLdu52hHL6ulgsteEY+cZ90Nx1
Malware Config
Signatures
Files
-
ed989d9d7e04a312dffe2fdd8dd30273d5b07ee56941f1a724b6143752ef42da.exe windows x86
2abfb21dbfa1afea540d42cc1884f155
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
GetModuleFileNameA
ExitProcess
CloseHandle
ReleaseMutex
OpenMutexA
GetTempPathA
GetEnvironmentVariableA
WaitForSingleObject
GetLastError
CreateMutexA
GetCurrentThreadId
GetWindowsDirectoryA
TerminateProcess
OutputDebugStringA
ExitThread
GetSystemDirectoryA
GetTickCount
GetStartupInfoA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetSystemDefaultUILanguage
GetVersionExA
lstrcpyA
GlobalMemoryStatusEx
GetSystemInfo
GetModuleHandleA
GlobalAlloc
GlobalFree
lstrlenA
LoadLibraryA
GetProcAddress
Sleep
CreateThread
lstrcatA
user32
GetInputState
GetMessageA
GetDesktopWindow
PostThreadMessageA
wsprintfA
advapi32
OpenServiceA
StartServiceCtrlDispatcherA
RegOpenKeyA
OpenSCManagerA
CloseServiceHandle
DeleteService
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
ws2_32
connect
WSAIoctl
setsockopt
send
recv
__WSAFDIsSet
select
WSAStartup
socket
gethostbyname
inet_addr
sendto
WSASocketA
WSACleanup
htonl
inet_ntoa
htons
closesocket
msvcrt
_exit
rand
_strrev
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_except_handler3
strncat
strchr
realloc
malloc
__CxxFrameHandler
_CxxThrowException
atoi
strncpy
strcspn
strstr
sprintf
free
??2@YAPAXI@Z
exit
strncmp
??3@YAXPAX@Z
??1type_info@@UAE@XZ
__dllonexit
_onexit
srand
_XcptFilter
_acmdln
__getmainargs
iphlpapi
GetIfTable
shlwapi
SHDeleteKeyA
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
molptqp Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE