Static task
static1
Behavioral task
behavioral1
Sample
5c47bc0822623999793bb7f79048f8fac2c22aa349dab3a68d222986234ca0cb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5c47bc0822623999793bb7f79048f8fac2c22aa349dab3a68d222986234ca0cb.exe
Resource
win10v2004-20221111-en
General
-
Target
5c47bc0822623999793bb7f79048f8fac2c22aa349dab3a68d222986234ca0cb
-
Size
88KB
-
MD5
3ee59d1d490e69260eb784c92c10db14
-
SHA1
22f39a48ae84ebc02b4159059f9be014fc0c6966
-
SHA256
5c47bc0822623999793bb7f79048f8fac2c22aa349dab3a68d222986234ca0cb
-
SHA512
51425dc627169a5455939738ab124055d1a49f3a0ca056962c7b33e40f31e77f071812e4edd0efa72d0a918bed652fe48cd00cdd59126ed8baa32bfa3da01fad
-
SSDEEP
1536:O0AxLwxZF5WGtL9JOscArDfibeE7fx6g:O0AxLyDWGtPOs/rjibeep6g
Malware Config
Signatures
Files
-
5c47bc0822623999793bb7f79048f8fac2c22aa349dab3a68d222986234ca0cb.exe windows x86
a108e51c4ab2f3d205af475ba66b3b78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
??3@YAXPAX@Z
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
time
strrchr
rand
atoi
exit
strcpy
free
strcat
strlen
realloc
_except_handler3
malloc
memcmp
??2@YAPAXI@Z
memset
memmove
_CxxThrowException
_ftol
__CxxFrameHandler
ceil
memcpy
_strrev
kernel32
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
GetCurrentThreadId
GetModuleFileNameA
DefineDosDeviceA
MoveFileExA
SetFileAttributesA
CreateDirectoryA
ExitProcess
CreateMutexA
OpenEventA
GetVersionExA
GetSystemInfo
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
GetModuleHandleA
GetProcessHeap
HeapAlloc
GetCurrentProcess
GetLastError
LoadLibraryA
GetProcAddress
DeleteFileA
InitializeCriticalSection
VirtualFree
Sleep
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateEventA
WaitForSingleObject
SetEvent
InterlockedExchange
CancelIo
ResetEvent
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
GetFileAttributesA
CreateProcessA
lstrlenA
lstrcpyA
TerminateThread
lstrcatA
GetTickCount
GetDriveTypeA
user32
CloseDesktop
LoadIconA
LoadCursorA
SetThreadDesktop
PostThreadMessageA
GetInputState
GetMessageA
wsprintfA
GetUserObjectInformationA
OpenInputDesktop
GetThreadDesktop
RegisterClassA
OpenDesktopA
gdi32
GetStockObject
advapi32
LookupPrivilegeValueA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
connect
htons
gethostbyname
socket
WSAIoctl
gethostname
getsockname
send
WSAStartup
select
setsockopt
WSACleanup
closesocket
recv
iphlpapi
GetIfTable
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
Sections
PAGE Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ