Static task
static1
Behavioral task
behavioral1
Sample
06a3d376d03982423b628c8fc74e3889f9b2df9c6e1103ed17852456de01bed6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
06a3d376d03982423b628c8fc74e3889f9b2df9c6e1103ed17852456de01bed6.exe
Resource
win10v2004-20220812-en
General
-
Target
06a3d376d03982423b628c8fc74e3889f9b2df9c6e1103ed17852456de01bed6
-
Size
88KB
-
MD5
73645db08fa66a690ad01c4bdd519c16
-
SHA1
11083398b11d0e5e11c1ffbd6324ffa9d8709fa4
-
SHA256
06a3d376d03982423b628c8fc74e3889f9b2df9c6e1103ed17852456de01bed6
-
SHA512
9d793ff3e5f6c9de46c6b9b739af1178ef501e4e186545f282e4f6ed8574ede87ca7d3a9ec694ec512484937cef975fd0940d04e4318750c7aecc8dcce7e97c1
-
SSDEEP
1536:m71VZy3whZLVWz9o9IqscMr4fibeJ2Ea:41VZy3ipWz9NqszriibeJ2Ea
Malware Config
Signatures
Files
-
06a3d376d03982423b628c8fc74e3889f9b2df9c6e1103ed17852456de01bed6.exe windows x86
a108e51c4ab2f3d205af475ba66b3b78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
??3@YAXPAX@Z
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
time
strrchr
rand
atoi
exit
strcpy
free
strcat
strlen
realloc
_except_handler3
malloc
memcmp
??2@YAPAXI@Z
memset
memmove
_CxxThrowException
_ftol
__CxxFrameHandler
ceil
memcpy
_strrev
kernel32
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
GetCurrentThreadId
GetModuleFileNameA
DefineDosDeviceA
MoveFileExA
SetFileAttributesA
CreateDirectoryA
ExitProcess
CreateMutexA
OpenEventA
GetVersionExA
GetSystemInfo
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
GetModuleHandleA
GetProcessHeap
HeapAlloc
GetCurrentProcess
GetLastError
LoadLibraryA
GetProcAddress
DeleteFileA
InitializeCriticalSection
VirtualFree
Sleep
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateEventA
WaitForSingleObject
SetEvent
InterlockedExchange
CancelIo
ResetEvent
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
GetFileAttributesA
CreateProcessA
lstrlenA
lstrcpyA
TerminateThread
lstrcatA
GetTickCount
GetDriveTypeA
user32
CloseDesktop
LoadIconA
LoadCursorA
SetThreadDesktop
PostThreadMessageA
GetInputState
GetMessageA
wsprintfA
GetUserObjectInformationA
OpenInputDesktop
GetThreadDesktop
RegisterClassA
OpenDesktopA
gdi32
GetStockObject
advapi32
LookupPrivilegeValueA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
connect
htons
gethostbyname
socket
WSAIoctl
gethostname
getsockname
send
WSAStartup
select
setsockopt
WSACleanup
closesocket
recv
iphlpapi
GetIfTable
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
Sections
PAGE Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ