Static task
static1
Behavioral task
behavioral1
Sample
6737ec0bc5237e0d0fbb00dc31e473a44a9a58b4cbdce0c02ef909aed987000d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6737ec0bc5237e0d0fbb00dc31e473a44a9a58b4cbdce0c02ef909aed987000d.exe
Resource
win10v2004-20221111-en
General
-
Target
6737ec0bc5237e0d0fbb00dc31e473a44a9a58b4cbdce0c02ef909aed987000d
-
Size
176KB
-
MD5
db2198543c3c97eb3bb001bf6a6f6490
-
SHA1
058a78d8baded5caaf24e799291ec1b7699775af
-
SHA256
6737ec0bc5237e0d0fbb00dc31e473a44a9a58b4cbdce0c02ef909aed987000d
-
SHA512
73c9632955785f348d7feecf0b5e9639a07a8f5212219602d3077fc74b712840ebcf6f6238a99ab1446b66eb886db5f44c77dd1e2ea77a7eef87fb31edc5dae2
-
SSDEEP
3072:VhWZmEzyKMWsqqdFkpUB/++hrYACqyWjBv6+07gagt8tezOUiAYMBMmz/AVm2i56:VhGKB6L7gKkq9I5LA02i5YROqmI
Malware Config
Signatures
Files
-
6737ec0bc5237e0d0fbb00dc31e473a44a9a58b4cbdce0c02ef909aed987000d.exe windows x86
8114487a4382749f31917c628706b628
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
_onexit
_lock
_controlfp_s
_decode_pointer
_invoke_watson
__dllonexit
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
_strnicmp
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
calloc
_snprintf
_beginthreadex
atol
mbstowcs
wcstombs
_errno
_mbscmp
_mbsstr
sprintf
strncmp
atoi
realloc
strncat
srand
rand
_time64
strncpy
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
strrchr
??_U@YAPAXI@Z
free
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
malloc
strchr
memmove
ceil
strstr
memcpy
memset
??3@YAXPAX@Z
_CxxThrowException
__CxxFrameHandler3
??2@YAPAXI@Z
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
GetProcAddress
LoadLibraryA
CloseHandle
WaitForSingleObject
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
CreateEventA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
lstrcpyA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
LocalFree
LocalReAlloc
LocalAlloc
RemoveDirectoryA
DeleteFileA
CreateFileA
WriteFile
SetFilePointer
MoveFileA
ReadFile
GetModuleFileNameA
GetCurrentProcess
CreateRemoteThread
ExitThread
GetTickCount
ExitProcess
GetSystemDirectoryA
GetLocalTime
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetStartupInfoA
CreatePipe
GlobalMemoryStatus
GetSystemInfo
OpenEventA
SetErrorMode
CreateMutexA
lstrcpyW
GlobalMemoryStatusEx
Process32Next
lstrcmpiA
Process32First
Module32First
GetModuleHandleA
GetCurrentThreadId
InterlockedCompareExchange
user32
CloseClipboard
SetClipboardData
LoadCursorA
OpenClipboard
GetSystemMetrics
SendMessageA
GetCursorInfo
ReleaseDC
GetDC
SetRect
SetProcessWindowStation
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CloseWindow
IsWindow
CreateWindowExA
DestroyCursor
wsprintfA
GetForegroundWindow
SystemParametersInfoA
gdi32
DeleteObject
DeleteDC
GetDIBits
CreateCompatibleBitmap
SelectObject
CreateDIBSection
CreateCompatibleDC
BitBlt
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ClearEventLogA
RegQueryValueExA
RegSetValueExA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LookupAccountNameA
IsValidSid
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
CreateServiceA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
EnumServicesStatusA
ChangeServiceConfig2A
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
winmm
waveOutReset
waveInUnprepareHeader
waveInReset
waveInStop
waveOutPrepareHeader
waveOutGetNumDevs
waveInAddBuffer
waveOutWrite
waveOutUnprepareHeader
waveOutClose
waveInStart
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInClose
ws2_32
getpeername
accept
listen
ioctlsocket
__WSAFDIsSet
select
recv
send
setsockopt
closesocket
WSAStartup
recvfrom
bind
ntohs
getsockname
WSAGetLastError
WSACleanup
htonl
gethostname
inet_ntoa
WSASocketA
inet_addr
sendto
socket
gethostbyname
WSAIoctl
connect
htons
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
iphlpapi
GetIfTable
netapi32
NetUserGetLocalGroups
NetApiBufferFree
NetUserEnum
NetUserGetInfo
NetUserSetInfo
NetLocalGroupAddMembers
NetUserDel
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
WTSQuerySessionInformationW
WTSEnumerateSessionsA
WTSLogoffSession
WTSDisconnectSession
Sections
.text Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.55412 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE