Static task
static1
Behavioral task
behavioral1
Sample
88c6d64d4cb6e811aaf66391a3496259099df68407461f2c63cb26dae85b71ff.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
88c6d64d4cb6e811aaf66391a3496259099df68407461f2c63cb26dae85b71ff.exe
Resource
win10v2004-20221111-en
General
-
Target
88c6d64d4cb6e811aaf66391a3496259099df68407461f2c63cb26dae85b71ff
-
Size
1.8MB
-
MD5
d09104418c75eb0cb3b73824a81247e9
-
SHA1
a15100358db8905c370e363abd9d180675706e3a
-
SHA256
88c6d64d4cb6e811aaf66391a3496259099df68407461f2c63cb26dae85b71ff
-
SHA512
d98e8299478aade4184efae3dba3bd2d275f2d5c8b7d6b9130d7e7a8c097c86266b1a62bf92479936b38a57f95230ed9b64a7c825699ef9f1383faf21633609c
-
SSDEEP
49152:exCdasoqwU24lwlQQFVQvJyPUW57WFtnVN0:eeqU2ZQM4J6Sz
Malware Config
Signatures
Files
-
88c6d64d4cb6e811aaf66391a3496259099df68407461f2c63cb26dae85b71ff.exe windows x86
f4d2970155dc4ad32217af38c6c4da17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord4379
ord4863
ord4860
ord3974
ord5914
ord1619
ord1402
ord5206
ord3344
ord1360
ord5166
ord1562
ord2717
ord4273
ord410
ord648
ord2164
ord4127
ord4125
ord6065
ord6283
ord1903
ord2419
ord2420
ord2421
ord2418
ord2417
ord3684
ord3430
ord1931
ord1483
ord1547
ord5915
ord4234
ord5214
ord4261
ord591
ord762
ord304
ord5731
ord2263
ord2367
ord709
ord602
ord5613
ord1929
ord1934
ord5888
ord347
ord501
ord5807
ord2469
ord3255
ord5331
ord6297
ord2346
ord1580
ord5320
ord6286
ord3161
ord3210
ord1280
ord1279
ord5637
ord2902
ord4098
ord2089
ord2991
ord3171
ord572
ord297
ord907
ord3454
ord1554
ord620
ord3195
ord6090
ord2131
ord3934
ord784
ord4353
ord2372
ord2468
ord4104
ord6167
ord3761
ord6236
ord3650
ord3477
ord741
ord6119
ord2095
ord1591
ord4240
ord3317
ord1614
ord760
ord631
ord1440
ord2280
ord386
ord1084
ord5563
ord3997
ord4394
ord4648
ord1728
ord1024
ord3204
ord4749
ord1966
ord4001
ord4123
ord5641
ord5833
ord3287
ord3989
ord2272
ord2654
ord4320
ord300
ord4035
ord5403
ord2475
ord1486
ord2662
ord1123
ord6144
ord2371
ord1283
ord4384
ord6179
ord1439
ord6288
ord629
ord5089
ord384
ord2751
ord3931
ord2288
ord911
ord1916
ord5529
ord3908
ord1396
ord807
ord795
ord4081
ord1263
ord1489
ord299
ord2933
ord6118
ord1482
ord266
ord265
ord5642
ord6037
ord1395
ord2451
ord3244
ord416
ord651
ord1930
ord2075
ord326
ord2477
ord2938
ord1565
ord2869
ord1091
ord3163
ord4100
ord2094
ord1955
ord4888
ord3635
ord3595
ord1920
ord2931
ord5224
ord5227
ord3948
ord4569
ord5230
ord5213
ord5567
ord2838
ord4481
ord759
ord570
ord2249
ord4541
ord3683
ord4085
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord5226
ord2248
ord4568
ord5566
ord3333
ord757
ord566
ord586
ord1054
ord1544
ord322
ord3830
ord751
ord1025
ord4189
ord3182
ord562
ord5715
ord5491
ord4041
ord1185
ord5323
ord557
ord745
ord908
ord5154
ord1191
ord1187
ord3760
ord630
ord3088
ord2021
ord385
ord3596
ord748
ord2098
ord1650
ord1594
ord4243
ord2983
ord3324
ord1545
ord4232
ord3164
ord587
ord4115
ord5640
ord2368
ord2086
ord4381
ord4399
ord4401
ord4386
ord4776
ord4587
ord4178
ord4171
ord912
ord4980
ord4389
ord4781
ord4204
ord4790
ord4443
ord4444
ord3740
ord4914
ord4519
ord4520
ord4920
ord4559
ord5049
ord4439
ord4368
ord4501
ord4846
ord4970
ord4529
ord4480
ord4971
ord4516
ord4673
ord4948
ord4794
ord4287
ord4376
ord4377
ord4963
ord4796
ord1207
ord4710
ord4364
ord4805
ord5053
ord4964
ord4649
ord4946
ord4507
ord4961
ord4674
ord4131
ord1302
ord2008
ord4132
ord781
ord4580
ord310
ord2322
ord876
ord2657
ord6067
ord578
ord1794
ord764
ord354
ord605
ord4262
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord3441
ord1063
ord3641
msvcr71
strlen
_itoa
_strnicmp
_strupr
_setmbcp
memset
strncpy
_CxxThrowException
_strdup
_except_handler3
_mbctype
abs
__p___argv
strrchr
strstr
ceil
_splitpath
strftime
_localtime64
memmove
fopen
fwrite
fclose
tolower
strncmp
strchr
_mbsnbicmp
_mbsrchr
strcpy
strcmp
strcat
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_time64
atoi
memcmp
time
srand
rand
??0exception@@QAE@ABV0@@Z
__CxxFrameHandler
sprintf
malloc
memcpy
free
fread
ftell
fseek
calloc
??1type_info@@UAE@XZ
__security_error_handler
__dllonexit
_onexit
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
labs
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
kernel32
MulDiv
FindResourceA
LoadResource
SizeofResource
LockResource
DeleteFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateEventA
WaitForSingleObject
ResumeThread
WinExec
GetPrivateProfileIntA
GetLastError
FreeLibrary
OutputDebugStringA
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
Sleep
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CloseHandle
SetUnhandledExceptionFilter
GetModuleFileNameA
GetLocalTime
EnterCriticalSection
GetPrivateProfileStringA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
WriteProcessMemory
VirtualAllocEx
lstrcmpiA
DeleteCriticalSection
lstrcpyA
GetFileAttributesA
lstrcatA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
WritePrivateProfileStringA
TerminateThread
CreateThread
ExitProcess
WaitForMultipleObjects
lstrlenA
MultiByteToWideChar
TerminateProcess
OpenProcess
WideCharToMultiByte
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
InterlockedIncrement
WriteFile
SetFilePointer
FreeResource
GetModuleHandleA
CreateMutexA
InitializeCriticalSection
GetCurrentThread
SetThreadPriority
Module32Next
Module32First
CreateProcessA
Thread32Next
OpenThread
Thread32First
FindClose
FindNextFileA
FindFirstFileA
GlobalHandle
ReadFile
LeaveCriticalSection
CreateRemoteThread
GetFileSize
user32
SetCapture
KillTimer
DrawEdge
GetWindowRect
SendMessageA
ReleaseCapture
GetWindowLongA
EnableWindow
SystemParametersInfoA
GetSystemMetrics
GetClientRect
SetTimer
CloseWindowStation
GetDlgItem
SetWindowTextA
OpenWindowStationA
SetWindowLongA
EnumDesktopsA
SetLayeredWindowAttributes
InvalidateRect
DrawTextA
DrawStateA
DrawFocusRect
GetWindowTextA
GetClassNameA
GetFocus
GetWindowDC
InsertMenuA
IsIconic
DrawIcon
RegisterWindowMessageA
LoadIconA
wsprintfA
MessageBeep
FlashWindow
GetWindowThreadProcessId
AttachThreadInput
SetFocus
keybd_event
BringWindowToTop
SetActiveWindow
CallNextHookEx
PtInRect
ModifyMenuA
GetMenuItemID
GetMenuItemCount
FillRect
InflateRect
CopyRect
GetSysColor
PeekMessageA
LoadCursorA
ScreenToClient
SetCursor
LoadMenuA
GetSubMenu
GetDesktopWindow
SetForegroundWindow
GetForegroundWindow
EnumWindows
UnhookWindowsHookEx
PostMessageA
IsWindowVisible
GetCursorPos
SetCursorPos
ClipCursor
ShowWindow
SetWindowsHookExA
SetWindowPos
GetDC
ReleaseDC
FindWindowA
LoadBitmapA
GetAsyncKeyState
PostQuitMessage
MessageBoxA
CallWindowProcA
gdi32
SetMapMode
GetWindowExtEx
GetViewportExtEx
CreateDCA
GetDIBits
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
DeleteObject
GetStockObject
CreatePen
GetDeviceCaps
CreateFontA
CreateSolidBrush
StretchBlt
SetPixel
PatBlt
CreateBitmap
BitBlt
GetMapMode
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
advapi32
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExA
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
Shell_NotifyIconA
ShellExecuteA
comctl32
ord17
ImageList_Draw
_TrackMouseEvent
shlwapi
PathRemoveFileSpecA
PathFileExistsA
StrStrIA
StrRStrIA
SHDeleteKeyA
ole32
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
VarBstrFromDate
SysFreeString
VariantChangeType
VariantClear
OleLoadPicture
VarUdateFromDate
ws2_32
inet_addr
gethostbyname
inet_ntoa
WSAStartup
listen
accept
WSACreateEvent
WSAEventSelect
htons
WSACloseEvent
closesocket
bind
htonl
ntohl
WSACleanup
select
WSAGetLastError
recv
socket
connect
shutdown
gethostname
send
msvcp71
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDHH@Z
?getline@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
??Bios_base@std@@QBEPAXXZ
??0?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@H@Z
??_D?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
dbghelp
MiniDumpWriteDump
psapi
EnumProcessModules
GetModuleBaseNameA
GetProcessImageFileNameA
EnumProcesses
netapi32
Netbios
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipFillRectangleI
GdipGetImageWidth
GdipLoadImageFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipFree
GdipLoadImageFromFileICM
GdipLoadImageFromFile
GdipDrawImageRectRect
GdipDeleteGraphics
GdipCreateFromHDC
GdipLoadImageFromStream
GdipAlloc
GdipGetImageHeight
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 332KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ