Static task
static1
Behavioral task
behavioral1
Sample
9779193c0ce58337003f8c40d97303eeb82ebdba698b95698eb5c1a34d5ee7d5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9779193c0ce58337003f8c40d97303eeb82ebdba698b95698eb5c1a34d5ee7d5.exe
Resource
win10v2004-20220812-en
General
-
Target
9779193c0ce58337003f8c40d97303eeb82ebdba698b95698eb5c1a34d5ee7d5
-
Size
27KB
-
MD5
98294d54e563c6c2d20af54faef979b9
-
SHA1
8fecb79183b8faede75c190034687eee22af600c
-
SHA256
9779193c0ce58337003f8c40d97303eeb82ebdba698b95698eb5c1a34d5ee7d5
-
SHA512
39abde59cb3a0ba56434a2fd26d426584e2471d5ec71f9dc2d8323993b662c052bec62723afe91fe878cd7ea6a6fbdfe94eba75aee252976badcbd077e7b4ca9
-
SSDEEP
768:RZn4nSycFvDlbFOb72vDBHkot9ZvibAtaFe8kEE9DA//:P4xGLlbcMH55QcoE9D
Malware Config
Signatures
Files
-
9779193c0ce58337003f8c40d97303eeb82ebdba698b95698eb5c1a34d5ee7d5.exe windows x86
46a2044e579dce25d7eb082a0ade67b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
Sleep
GetTickCount
GetCurrentProcessId
WinExec
lstrcpyA
ExitThread
GetSystemInfo
CreateThread
ExitProcess
ReleaseMutex
OpenMutexA
OutputDebugStringA
WaitForSingleObject
GetLastError
CreateMutexA
GetStartupInfoA
GetModuleFileNameA
CloseHandle
TerminateProcess
CreateProcessA
FreeLibrary
LoadLibraryA
GetProcAddress
lstrcatA
user32
wsprintfA
advapi32
DeleteService
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
StartServiceCtrlDispatcherA
CreateServiceA
ws2_32
__WSAFDIsSet
recv
shutdown
send
WSAStartup
gethostname
inet_ntoa
WSASocketA
select
setsockopt
htonl
sendto
WSACleanup
htons
connect
closesocket
inet_addr
gethostbyname
WSAGetLastError
socket
msvcrt
strlen
_controlfp
__set_app_type
__p__fmode
strncpy
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_CxxThrowException
__CxxFrameHandler
strstr
malloc
free
strcat
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
rand
sprintf
printf
fprintf
_iob
memcpy
_except_handler3
_local_unwind2
strcpy
iphlpapi
GetIfTable
shlwapi
SHDeleteKeyA
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ