Static task
static1
Behavioral task
behavioral1
Sample
8acde43dd0a9260b9488557964b1261061feefc6113956e5b857d62eaa415d71.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8acde43dd0a9260b9488557964b1261061feefc6113956e5b857d62eaa415d71.exe
Resource
win10v2004-20221111-en
General
-
Target
8acde43dd0a9260b9488557964b1261061feefc6113956e5b857d62eaa415d71
-
Size
36KB
-
MD5
c05faf3d61735437e8bed6934a3c3b76
-
SHA1
28cfd5898d1d5ef99ef1be72de774a7ae046bf85
-
SHA256
8acde43dd0a9260b9488557964b1261061feefc6113956e5b857d62eaa415d71
-
SHA512
e1d1234f295e8f7dac06f1f8edb9c6fc285b91d70504a19db4fbd1a323a69caf4c87e2a2a13e21dc87387b5f138a439d055c550ae61642192fbc132791ca701e
-
SSDEEP
384:ycbtagZ+o+cqzJ3gBTU6ZK/zHzgEzIMB2kju+7DvESKFKeK47Xs39:yco8czxgO6qH/zIMVj0SKnK47Y9
Malware Config
Signatures
Files
-
8acde43dd0a9260b9488557964b1261061feefc6113956e5b857d62eaa415d71.exe windows x86
c279f86dfdbed1cf6d46a355e4023214
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
Sleep
WriteFile
CloseHandle
ReadFile
GetFileSize
lstrcmpiA
DeleteFileA
OpenProcess
FindClose
FindNextFileA
FindFirstFileA
CopyFileA
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
GetFileAttributesA
lstrcmpA
lstrlenA
CreateMutexA
GetLastError
CreateThread
GetTickCount
GetModuleHandleA
ExitProcess
TerminateProcess
user32
IsWindow
SendMessageA
DestroyWindow
GetActiveWindow
GetKeyNameTextA
GetKeyboardState
ToAscii
CallNextHookEx
CloseWindow
PostQuitMessage
UnhookWindowsHookEx
GetDesktopWindow
GetForegroundWindow
GetWindowTextA
wsprintfA
MoveWindow
TranslateMessage
GetMessageA
ShowWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DefWindowProcA
SetWindowsHookExA
SetKeyboardState
SetTimer
DispatchMessageA
gdi32
DeleteObject
GetDIBColorTable
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
GetDeviceCaps
CreateDCA
DeleteDC
shell32
ShellExecuteA
odbc32
ord24
ord75
ord41
ord11
ord9
ord31
msvcrt
free
memcpy
strncat
srand
rand
strncpy
malloc
atol
sprintf
strtok
strstr
strcpy
strlen
??2@YAPAXI@Z
??3@YAXPAX@Z
atoi
strcat
memset
wininet
InternetGetConnectedState
ws2_32
getsockname
inet_ntoa
gethostbyaddr
htonl
sendto
WSAGetLastError
accept
listen
bind
select
send
ioctlsocket
socket
setsockopt
WSAAsyncSelect
htons
inet_addr
gethostbyname
connect
WSAStartup
WSACleanup
__WSAFDIsSet
closesocket
recv
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
mpr
WNetEnumResourceA
WNetOpenEnumA
WNetCloseEnum
psapi
GetModuleBaseNameA
EnumProcessModules
GetModuleFileNameExA
EnumProcesses
urlmon
URLDownloadToFileA
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE