Static task
static1
Behavioral task
behavioral1
Sample
87dd2534556da78e586094b3bc64bc63f3ad361acb8a850f27c832dce57ec1a5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87dd2534556da78e586094b3bc64bc63f3ad361acb8a850f27c832dce57ec1a5.exe
Resource
win10v2004-20221111-en
General
-
Target
87dd2534556da78e586094b3bc64bc63f3ad361acb8a850f27c832dce57ec1a5
-
Size
54KB
-
MD5
6ee88260f1fb767a475ee640dbf0e566
-
SHA1
4110123106520cc1d3032c53e770da7d90d282e4
-
SHA256
87dd2534556da78e586094b3bc64bc63f3ad361acb8a850f27c832dce57ec1a5
-
SHA512
3a5e208a1e89ecfb360d68eb0b4629aeb57b41fcc7b2a33c5fbe4804a8088a383ec3bf70b7f6d036a1948538c2503896888993b81e5f24a8fa935b22f9d8157c
-
SSDEEP
1536:0qIj60adi21dEiRLSl8sdQw/d1Wbr1i6/ADpK9Y2yWE:na512/nRLOdQWd1Wv1X/AD49Y25E
Malware Config
Signatures
Files
-
87dd2534556da78e586094b3bc64bc63f3ad361acb8a850f27c832dce57ec1a5.exe windows x86
dcb07fb275a31e563319f3b4306c27f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAStartup
gethostbyname
socket
setsockopt
send
listen
inet_ntoa
inet_addr
htons
htonl
ioctlsocket
connect
closesocket
bind
accept
WSACleanup
WSAGetLastError
select
recv
__WSAFDIsSet
dbghelp
MakeSureDirectoryPathExists
psapi
GetModuleFileNameExA
kernel32
GlobalSize
GetProcessHandleCount
GetProcessTimes
GetCurrentProcess
ExitProcess
GetCurrentThreadId
GetLastError
SetErrorMode
Sleep
FindClose
SetFileTime
CloseHandle
GetSystemTime
GetLocalTime
SystemTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTickCount
lstrlenA
CreateMutexA
GetModuleFileNameA
GetModuleHandleA
GetCommandLineA
GetWindowsDirectoryA
CreateFileA
FindFirstFileA
SetLocalTime
lstrcpyA
GetSystemDirectoryA
CreateThread
ReleaseMutex
WaitForSingleObject
GetComputerNameA
GetVersionExA
ReadFile
SetFilePointer
lstrcatA
GetLogicalDriveStringsA
GetDriveTypeA
FindNextFileA
ExpandEnvironmentStringsA
InterlockedIncrement
InterlockedDecrement
QueryPerformanceCounter
GetFileSizeEx
WriteFile
MultiByteToWideChar
InterlockedExchangeAdd
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
OutputDebugStringA
OpenProcess
CreateProcessA
lstrcpynA
MulDiv
GlobalAlloc
GlobalUnlock
GlobalLock
user32
GetAsyncKeyState
GetSystemMetrics
wsprintfA
PeekMessageA
GetKeyboardLayout
DefWindowProcA
RegisterClassA
CreateWindowExA
DestroyWindow
GetKeyState
ToAsciiEx
GetForegroundWindow
GetWindowRect
GetCursorPos
ClientToScreen
IsRectEmpty
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetGUIThreadInfo
PostThreadMessageA
RegisterRawInputDevices
ShowWindow
IsWindowVisible
IsIconic
MsgWaitForMultipleObjects
EnumChildWindows
EnumWindows
SendInput
SetCursorPos
MessageBoxA
SendMessageA
ExitWindowsEx
GetDC
ReleaseDC
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
EmptyClipboard
DispatchMessageA
TranslateMessage
GetMessageA
GetRawInputData
gdi32
BitBlt
SelectObject
GetDIBits
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
advapi32
RegOpenKeyExA
RegSetValueExA
OpenProcessToken
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 461B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ