Static task
static1
Behavioral task
behavioral1
Sample
a5421990c57e4199aac19fb5dbfe8f3d72586d3d7ffbb544a1023bc430630ccb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5421990c57e4199aac19fb5dbfe8f3d72586d3d7ffbb544a1023bc430630ccb.exe
Resource
win10v2004-20221111-en
General
-
Target
a5421990c57e4199aac19fb5dbfe8f3d72586d3d7ffbb544a1023bc430630ccb
-
Size
88KB
-
MD5
508999b4b3b3ba33e50ed707f8477bc6
-
SHA1
be7e693565d250ffd909b3d903c1887decf640c8
-
SHA256
a5421990c57e4199aac19fb5dbfe8f3d72586d3d7ffbb544a1023bc430630ccb
-
SHA512
814531c5ba3f93530756caec5df8b44234f0515dfc36855fd9f43fe5c9ec27a1b535288df254ec05fd3f772309e5b7ff6511a794151833a855ff26bf83f29452
-
SSDEEP
1536:mIRD/Fh6JTmxjO7mAcHYBhfcTcr4sl4Oq:mIdFxjO7mAcYPcTcr4k4Oq
Malware Config
Signatures
Files
-
a5421990c57e4199aac19fb5dbfe8f3d72586d3d7ffbb544a1023bc430630ccb.exe windows x86
6184ebca7478f691af838da011b5e199
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord825
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
__CxxFrameHandler
_CxxThrowException
memmove
_ftol
malloc
_except_handler3
realloc
free
strstr
exit
atoi
rand
sprintf
strncmp
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
_adjust_fdiv
__setusermatherr
kernel32
MoveFileA
Process32Next
MoveFileExA
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
CreateThread
lstrcmpiA
CopyFileA
GetProcAddress
LoadLibraryA
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
InterlockedExchange
CancelIo
Sleep
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
VirtualAlloc
GetFileAttributesA
CreateProcessA
lstrlenA
lstrcpyA
TerminateThread
lstrcatA
GetTickCount
DeleteFileA
GetLastError
GetCurrentProcess
HeapAlloc
GetProcessHeap
GetModuleHandleA
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
OpenEventA
CreateMutexA
ExitProcess
GetModuleFileNameA
GetCurrentThreadId
user32
SetThreadDesktop
CloseDesktop
LoadIconA
LoadCursorA
RegisterClassA
PostThreadMessageA
GetInputState
GetMessageA
GetUserObjectInformationA
GetWindow
FindWindowA
FindWindowExA
SendMessageA
GetDlgCtrlID
PostMessageA
SendInput
wsprintfA
GetThreadDesktop
OpenDesktopA
OpenInputDesktop
ShowWindow
gdi32
GetStockObject
advapi32
StartServiceCtrlDispatcherA
OpenEventLogA
CloseEventLog
OpenSCManagerA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
StartServiceA
CloseServiceHandle
RegOpenKeyExA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
ClearEventLogA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
gethostbyname
socket
closesocket
send
htons
gethostname
getsockname
WSAStartup
recv
connect
setsockopt
WSACleanup
select
iphlpapi
GetIfTable
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ