Static task
static1
Behavioral task
behavioral1
Sample
dfbb7a6572af36c2072ce5c1e8907372833ee33ef0e3d285f4f0575427d966a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfbb7a6572af36c2072ce5c1e8907372833ee33ef0e3d285f4f0575427d966a7.exe
Resource
win10v2004-20220812-en
General
-
Target
dfbb7a6572af36c2072ce5c1e8907372833ee33ef0e3d285f4f0575427d966a7
-
Size
72KB
-
MD5
72b8c8decbd4238cd40e63372949bdd1
-
SHA1
882d33835dfbdf6650b53385fb5be5f40ccb020f
-
SHA256
dfbb7a6572af36c2072ce5c1e8907372833ee33ef0e3d285f4f0575427d966a7
-
SHA512
9f9b3594ad49a46ec71cf0be4a326c6a6e6bcee7602412482d8def143c3a7ecd9995339cc08ed7a7f2aa9b1d70c3a913afdb2b981980cf6af68a1610fe86f724
-
SSDEEP
768:5RVNmZkOE8oHcbRij/oBw1s40oiNoMGcuZNh/QPP+fr7yJNO328v1CvBOxPo:5RVfERe/oXoisc6Qefr7yJYmm4JL
Malware Config
Signatures
Files
-
dfbb7a6572af36c2072ce5c1e8907372833ee33ef0e3d285f4f0575427d966a7.exe windows x86
9b76dac8a18f363adaed8a7f786ed2c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostMessageA
GetThreadDesktop
GetClassNameA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetInputState
PostThreadMessageA
GetMessageA
FindWindowA
GetWindowTextA
GetWindow
GetUserObjectInformationA
wsprintfA
advapi32
ClearEventLogA
GetUserNameA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenEventLogA
CloseEventLog
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
kernel32
SetEvent
CreateEventA
VirtualProtect
GetProcessHeap
HeapAlloc
WriteFile
CreateFileA
GetLastError
GetFileAttributesA
GetModuleHandleA
GetStartupInfoA
HeapFree
GetCurrentThreadId
GetWindowsDirectoryA
CopyFileA
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
InterlockedExchange
lstrcpyA
lstrlenA
MultiByteToWideChar
LocalFree
WinExec
lstrcatA
GetSystemDirectoryA
ExitProcess
Sleep
CloseHandle
WaitForSingleObject
GetCurrentProcess
GetProcAddress
LoadLibraryA
GlobalMemoryStatusEx
OpenProcess
FreeLibrary
GetSystemInfo
GetDiskFreeSpaceExA
GetDriveTypeA
GetTickCount
GetComputerNameA
GetLocalTime
GetModuleFileNameA
GetVersionExA
SetFileAttributesA
lstrcmpiA
avicap32
capGetDriverDescriptionA
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
msvcrt
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_stricmp
__p__commode
__p__fmode
__set_app_type
_controlfp
_strupr
??1type_info@@UAE@XZ
_onexit
__dllonexit
calloc
strchr
??3@YAXPAX@Z
memcpy
memmove
ceil
_ftol
strlen
strstr
__CxxFrameHandler
printf
memset
??2@YAPAXI@Z
_CxxThrowException
puts
strrchr
wcscpy
fclose
fwrite
fseek
ftell
fopen
strcmp
strcat
_mbsrev
_mbsicmp
strcpy
atol
rand
realloc
free
_beginthreadex
_except_handler3
netapi32
NetLocalGroupAddMembers
NetUserAdd
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE