Static task
static1
Behavioral task
behavioral1
Sample
0b9a72eeaed7a0dc2ab79f34f6d708120ff42227f0df75237fbdbdf2f193142f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b9a72eeaed7a0dc2ab79f34f6d708120ff42227f0df75237fbdbdf2f193142f.exe
Resource
win10v2004-20220812-en
General
-
Target
0b9a72eeaed7a0dc2ab79f34f6d708120ff42227f0df75237fbdbdf2f193142f
-
Size
88KB
-
MD5
02c853075522726c6f4aebef0c96b0e4
-
SHA1
005e4a77946e3dfa9f704463228e37d8ec17bcc0
-
SHA256
0b9a72eeaed7a0dc2ab79f34f6d708120ff42227f0df75237fbdbdf2f193142f
-
SHA512
b1a6bc894c3a8196f24735a90f80c5d2c22d705307c74a17b0feb854cb9ea4123c8e20e8530bb0b879ca2d0fbb2ad931b629803a2be4036f4fca08e2137f445e
-
SSDEEP
1536:l0AxLwxZFVWGtL9JOscArDfibeE7fxtS:l0AxLynWGtPOs/rjibeeptS
Malware Config
Signatures
Files
-
0b9a72eeaed7a0dc2ab79f34f6d708120ff42227f0df75237fbdbdf2f193142f.exe windows x86
a108e51c4ab2f3d205af475ba66b3b78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
??3@YAXPAX@Z
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
time
strrchr
rand
atoi
exit
strcpy
free
strcat
strlen
realloc
_except_handler3
malloc
memcmp
??2@YAPAXI@Z
memset
memmove
_CxxThrowException
_ftol
__CxxFrameHandler
ceil
memcpy
_strrev
kernel32
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
GetCurrentThreadId
GetModuleFileNameA
DefineDosDeviceA
MoveFileExA
SetFileAttributesA
CreateDirectoryA
ExitProcess
CreateMutexA
OpenEventA
GetVersionExA
GetSystemInfo
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
GetModuleHandleA
GetProcessHeap
HeapAlloc
GetCurrentProcess
GetLastError
LoadLibraryA
GetProcAddress
DeleteFileA
InitializeCriticalSection
VirtualFree
Sleep
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateEventA
WaitForSingleObject
SetEvent
InterlockedExchange
CancelIo
ResetEvent
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
GetFileAttributesA
CreateProcessA
lstrlenA
lstrcpyA
TerminateThread
lstrcatA
GetTickCount
GetDriveTypeA
user32
CloseDesktop
LoadIconA
LoadCursorA
SetThreadDesktop
PostThreadMessageA
GetInputState
GetMessageA
wsprintfA
GetUserObjectInformationA
OpenInputDesktop
GetThreadDesktop
RegisterClassA
OpenDesktopA
gdi32
GetStockObject
advapi32
LookupPrivilegeValueA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
connect
htons
gethostbyname
socket
WSAIoctl
gethostname
getsockname
send
WSAStartup
select
setsockopt
WSACleanup
closesocket
recv
iphlpapi
GetIfTable
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
Sections
PAGE Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ