Static task
static1
Behavioral task
behavioral1
Sample
bc99c6762133fb919ba422151f545c4d83527b2b1c55bedc89ef7959d3d8d353.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bc99c6762133fb919ba422151f545c4d83527b2b1c55bedc89ef7959d3d8d353.exe
Resource
win10v2004-20220901-en
General
-
Target
bc99c6762133fb919ba422151f545c4d83527b2b1c55bedc89ef7959d3d8d353
-
Size
76KB
-
MD5
8a2a80b1802223e7cf3788e37e9a1dc7
-
SHA1
cde8ddbdb2ea8a38eb3b36297c54329ff369a1ec
-
SHA256
bc99c6762133fb919ba422151f545c4d83527b2b1c55bedc89ef7959d3d8d353
-
SHA512
aa542b3a7e9e41179ade5ac920def17a63b451532b6dfea6465f6a6466150f4759420b6e030ede419b627148d12deecad432133cfb61373cf6c3bdaefdbf0b69
-
SSDEEP
1536:RfAX2l7tdjkXYjZe6ystvuhNoi3CJ/riMdAEksOgojBDkVst:g2lvZjZe6ystvQZ3CROMpxOLNIy
Malware Config
Signatures
Files
-
bc99c6762133fb919ba422151f545c4d83527b2b1c55bedc89ef7959d3d8d353.exe windows x86
218ee612f1a76a19e2ff866ba2fde50b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
ExitProcess
CloseHandle
ReleaseMutex
OpenMutexA
GetTempPathA
lstrlenA
GetSystemDefaultUILanguage
WaitForSingleObject
GetLastError
CreateMutexA
GetModuleHandleA
GetCurrentThreadId
GetWindowsDirectoryA
GetStartupInfoA
TerminateProcess
OutputDebugStringA
ExitThread
GetSystemDirectoryA
GetTickCount
GetVersionExA
lstrcpyA
GlobalMemoryStatusEx
GlobalAlloc
GlobalFree
LoadLibraryA
GetProcAddress
Sleep
CreateThread
user32
GetDesktopWindow
GetMessageA
PostThreadMessageA
GetInputState
wsprintfA
advapi32
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
StartServiceCtrlDispatcherA
ws2_32
recv
send
__WSAFDIsSet
WSAIoctl
htons
connect
closesocket
select
WSAStartup
htonl
inet_ntoa
setsockopt
gethostbyname
inet_addr
sendto
WSASocketA
WSACleanup
socket
iphlpapi
GetIfTable
shlwapi
SHDeleteKeyA
msvcrt
_controlfp
_strrev
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
realloc
malloc
__CxxFrameHandler
_CxxThrowException
atoi
strncpy
strcspn
strstr
sprintf
free
??2@YAPAXI@Z
exit
strncmp
_except_handler3
??3@YAXPAX@Z
rand
srand
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xsadezd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE