Static task
static1
Behavioral task
behavioral1
Sample
09cdbe109462acceb10394a9eedee4059e47b2583d0dcd102382bb39a2bc2a3c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
09cdbe109462acceb10394a9eedee4059e47b2583d0dcd102382bb39a2bc2a3c.exe
Resource
win10v2004-20220901-en
General
-
Target
09cdbe109462acceb10394a9eedee4059e47b2583d0dcd102382bb39a2bc2a3c
-
Size
159KB
-
MD5
2bfc4742c4e4804655134ddaa1de65f2
-
SHA1
5cc2049e95a2444f88525cca8353d76e7c8d8514
-
SHA256
09cdbe109462acceb10394a9eedee4059e47b2583d0dcd102382bb39a2bc2a3c
-
SHA512
35744892c068811746323981b1b8d07f97fde69f98b9298838fb9433cf0498c7a4a460829cf586fd44ce8c6f9bf5f10dfa0798f882d54cda9011389866ee3deb
-
SSDEEP
3072:H1Jf8Yg5NDJ9Ma4U37gsA6mhV3yY0jQMVdZ++vZsXEzd3okPeOzS:H1vu4C7gF6m8JUkZ++yK7PeOzS
Malware Config
Signatures
Files
-
09cdbe109462acceb10394a9eedee4059e47b2583d0dcd102382bb39a2bc2a3c.exe windows x86
502231a152eb793ca813b17c4402f09a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_controlfp_s
_invoke_watson
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
_strnicmp
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
calloc
_snprintf
_beginthreadex
atol
mbstowcs
wcstombs
_errno
sprintf
strncmp
atoi
realloc
strncat
srand
rand
_time64
strncpy
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
strrchr
??_U@YAPAXI@Z
free
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
malloc
strchr
memmove
ceil
strstr
memcpy
memset
??3@YAXPAX@Z
_CxxThrowException
__CxxFrameHandler3
??2@YAPAXI@Z
kernel32
Sleep
WaitForSingleObject
SetEvent
GetProcAddress
LoadLibraryA
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
CreateEventA
CancelIo
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
lstrcpyA
FreeLibrary
MultiByteToWideChar
TerminateThread
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
DeleteFileA
CreateFileA
WriteFile
SetFilePointer
WideCharToMultiByte
ReadFile
GetModuleFileNameA
GetCurrentProcess
CreateRemoteThread
OpenProcess
ExitThread
GetTickCount
ExitProcess
GetSystemDirectoryA
GetLocalTime
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetStartupInfoA
CreatePipe
GlobalMemoryStatus
GetSystemInfo
OpenEventA
SetErrorMode
CreateMutexA
lstrcpyW
GlobalMemoryStatusEx
Process32Next
lstrcmpiA
Process32First
Module32First
GetModuleHandleA
CreateToolhelp32Snapshot
GetCurrentThreadId
InterlockedCompareExchange
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
CloseHandle
MoveFileA
InterlockedExchange
user32
SetClipboardData
CloseClipboard
WindowFromPoint
SetCapture
EmptyClipboard
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
OpenClipboard
SystemParametersInfoA
SendMessageA
GetCursorInfo
ReleaseDC
GetDC
GetDesktopWindow
SetRect
SetProcessWindowStation
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
GetThreadDesktop
DispatchMessageA
OpenDesktopA
PostMessageA
CloseWindow
IsWindow
CreateWindowExA
MapVirtualKeyA
TranslateMessage
GetMessageA
GetSystemMetrics
wsprintfA
CharNextA
GetWindowTextA
GetForegroundWindow
gdi32
DeleteObject
DeleteDC
GetDIBits
CreateCompatibleBitmap
BitBlt
SelectObject
CreateCompatibleDC
CreateDIBSection
advapi32
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueExA
RegSetValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LookupAccountNameA
IsValidSid
SetServiceStatus
CreateServiceA
ChangeServiceConfig2A
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
StartServiceCtrlDispatcherA
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
EnumServicesStatusA
RegisterServiceCtrlHandlerA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
winmm
waveInStop
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInAddBuffer
waveInReset
waveInStart
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutClose
waveInUnprepareHeader
waveInClose
waveOutReset
waveOutWrite
waveOutUnprepareHeader
ws2_32
socket
sendto
inet_addr
connect
WSAIoctl
select
recv
send
setsockopt
closesocket
WSAStartup
ioctlsocket
listen
accept
getpeername
__WSAFDIsSet
recvfrom
bind
ntohs
getsockname
WSAGetLastError
WSACleanup
htonl
gethostname
inet_ntoa
gethostbyname
WSASocketA
htons
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrameStart
ICOpen
ICSeqCompressFrame
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
iphlpapi
GetIfTable
netapi32
NetUserDel
NetApiBufferFree
NetUserEnum
NetUserGetLocalGroups
NetUserGetInfo
NetUserSetInfo
NetLocalGroupAddMembers
NetUserAdd
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSQuerySessionInformationW
WTSEnumerateSessionsA
WTSLogoffSession
WTSDisconnectSession
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.CCC Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.VVV Size: 1024B - Virtual size: 851B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.BBB Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.XXX Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MMM Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ZZZ Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ