Static task
static1
Behavioral task
behavioral1
Sample
18b76bdd4c19b36b2cfb070d458690dd286942bc5a6d05518eec0a91ca886820.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
18b76bdd4c19b36b2cfb070d458690dd286942bc5a6d05518eec0a91ca886820.exe
Resource
win10v2004-20220812-en
General
-
Target
18b76bdd4c19b36b2cfb070d458690dd286942bc5a6d05518eec0a91ca886820
-
Size
68KB
-
MD5
35c48897dc4465d3419014a4f8330eaa
-
SHA1
6d83c17405b006dd5795cc34d1aa0e4c294936ef
-
SHA256
18b76bdd4c19b36b2cfb070d458690dd286942bc5a6d05518eec0a91ca886820
-
SHA512
a516ca25e8f93387df919739cec2d2c04a5bbdfbb649b671b94f211398fed7c136b187c8ef2bdf9a080444d73f55a133b385a68284bd7d3783ec0dc8adc4e3ef
-
SSDEEP
768:eet0fF+X2lJprX4qd4omHs8EG3BZTUYVMystvaL/XSkO1gNLjsddP:WfAX2l7tdjkZjZN6ystvaL/i3mNLjsd
Malware Config
Signatures
Files
-
18b76bdd4c19b36b2cfb070d458690dd286942bc5a6d05518eec0a91ca886820.exe windows x86
218ee612f1a76a19e2ff866ba2fde50b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
ExitProcess
CloseHandle
ReleaseMutex
OpenMutexA
GetTempPathA
lstrlenA
GetSystemDefaultUILanguage
WaitForSingleObject
GetLastError
CreateMutexA
GetModuleHandleA
GetCurrentThreadId
GetWindowsDirectoryA
GetStartupInfoA
TerminateProcess
OutputDebugStringA
ExitThread
GetSystemDirectoryA
GetTickCount
GetVersionExA
lstrcpyA
GlobalMemoryStatusEx
GlobalAlloc
GlobalFree
LoadLibraryA
GetProcAddress
Sleep
CreateThread
user32
GetDesktopWindow
GetMessageA
PostThreadMessageA
GetInputState
wsprintfA
advapi32
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
StartServiceCtrlDispatcherA
ws2_32
recv
send
__WSAFDIsSet
WSAIoctl
htons
connect
closesocket
select
WSAStartup
htonl
inet_ntoa
setsockopt
gethostbyname
inet_addr
sendto
WSASocketA
WSACleanup
socket
iphlpapi
GetIfTable
shlwapi
SHDeleteKeyA
msvcrt
_controlfp
_strrev
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
realloc
malloc
__CxxFrameHandler
_CxxThrowException
atoi
strncpy
strcspn
strstr
sprintf
free
??2@YAPAXI@Z
exit
strncmp
_except_handler3
??3@YAXPAX@Z
rand
srand
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ