Static task
static1
Behavioral task
behavioral1
Sample
11457f8004b19e4b3750da7548a679c750a62d3c5c25d1b16e4388d1654c1847.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
11457f8004b19e4b3750da7548a679c750a62d3c5c25d1b16e4388d1654c1847.exe
Resource
win10v2004-20220901-en
General
-
Target
11457f8004b19e4b3750da7548a679c750a62d3c5c25d1b16e4388d1654c1847
-
Size
24KB
-
MD5
46224c767a6c2765738a00bb9d797814
-
SHA1
064532dc954b11528478ba2e25858b377e9823f7
-
SHA256
11457f8004b19e4b3750da7548a679c750a62d3c5c25d1b16e4388d1654c1847
-
SHA512
fe30ca3c7ce2709ca8cb6790481a8af6a94db6d81549ed020874c8c97a14c47f4474f98f48f12e9df0616ac649ab19025064f08cdc487bfb7e05ca4e932047ef
-
SSDEEP
384:ToYSu8qYG9jlCowhK6voCZoBROua9vd6ROiNTHa4yTO:24YmjlrwhnZoYd6RRNH1
Malware Config
Signatures
Files
-
11457f8004b19e4b3750da7548a679c750a62d3c5c25d1b16e4388d1654c1847.exe windows x86
a56fdf4eef66f9e3364ecef48850e00b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetVersionExA
Sleep
GetLastError
GlobalFree
GetTempFileNameA
WinExec
CloseHandle
WriteFile
CreateFileA
GetModuleFileNameA
GetTempPathA
CreateThread
ReadFile
DeleteFileA
lstrlenA
ExitProcess
CreateProcessA
MultiByteToWideChar
GetModuleHandleA
CreateDirectoryA
ExpandEnvironmentStringsA
LoadLibraryA
GlobalAlloc
GetProcAddress
user32
PostQuitMessage
DefWindowProcA
CreateWindowExA
RegisterClassA
wsprintfA
GetMessageA
TranslateMessage
DispatchMessageA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
msvcp60
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
msvcrt
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
_stricmp
__p__fmode
__set_app_type
_except_handler3
_controlfp
_itoa
__CxxFrameHandler
strcat
strcpy
strncpy
strncmp
strlen
memset
memcpy
malloc
rand
srand
fclose
fread
ftell
fseek
fopen
_access
time
_exit
_XcptFilter
exit
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE