Static task
static1
Behavioral task
behavioral1
Sample
ac6da9adb4dd77b4b4e3f9246056a71b908209ca11222fefd569f4a530b05f12.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac6da9adb4dd77b4b4e3f9246056a71b908209ca11222fefd569f4a530b05f12.exe
Resource
win10v2004-20221111-en
General
-
Target
ac6da9adb4dd77b4b4e3f9246056a71b908209ca11222fefd569f4a530b05f12
-
Size
56KB
-
MD5
7cd16566530550f02b51fb1eb126bcd1
-
SHA1
fedd61cb56aa95e5f133ee4922ad4716004fd49a
-
SHA256
ac6da9adb4dd77b4b4e3f9246056a71b908209ca11222fefd569f4a530b05f12
-
SHA512
41d87c943dd55d4af37e3f62dc322308b0b5ab966db13fcf182e4c5f3345fc9095acd477dcdf1d1206a4255f194b177a8d8d8c6774caaa703d451a646abbed3b
-
SSDEEP
1536:mplP8Bv+zx+D0qo2Zv70dfdhymaeIontvVsYay:mplP8R4cDJRZz0VHXSF
Malware Config
Signatures
Files
-
ac6da9adb4dd77b4b4e3f9246056a71b908209ca11222fefd569f4a530b05f12.exe windows x86
8dc2060f9cd4604f1c912144b783acbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
atol
_mbsnbcat
exit
_clearfp
_mbscpy
_tzset
_mbsrchr
_sys_errlist
_mbsspn
_CIpow
_mbbtombc
vfprintf
_tzname
_sleep
wcscspn
isupper
_CIsinh
clock
_wcsrev
strtoul
_fsopen
strncpy
_spawnvpe
_CIlog10
fsetpos
sprintf
_mbsnbcnt
_findclose
_cprintf
atan
_ismbclegal
_ismbbprint
msvcrt
__p__commode
__pctype_func
_winminor
_CIsinh
_filbuf
??1bad_cast@@UAE@XZ
__p__amblksiz
_adj_fdivr_m32
??4__non_rtti_object@@QAEAAV0@ABV0@@Z
_ismbcprint
_fcvt
_wmktemp
_dstbias
_ismbslead
_chkesp
_atoi64
_kbhit
swscanf
_heapchk
_wspawnvp
_getmbcp
exit
_spawnl
__getmainargs
memset
wcsspn
__pioinfo
__set_app_type
fflush
_beginthread
fgetpos
_fpieee_flt
_y1
_setmaxstdio
tmpfile
?raw_name@type_info@@QBEPBDXZ
_chdrive
netapi32
NetpwNameCompare
I_NetServerPasswordSet2
NetGroupGetUsers
I_NetServerReqChallenge
NetAlertRaiseEx
NetGroupGetInfo
NetShareSetInfo
NetpInitFtinfoContext
NetpCloseConfigData
I_BrowserResetStatistics
NetUserGetInfo
I_BrowserDebugTrace
DsRoleDcAsDc
NetScheduleJobEnum
NetpSetFileSecurity
DsRoleDnsNameToFlatName
NetReplExportDirEnum
I_NetServerAuthenticate2
DsRoleAbortDownlevelServerUpgrade
I_NetGetForestTrustInformation
I_NetServerAuthenticate3
I_BrowserDebugCall
NetUserDel
NetApiBufferFree
I_NetLogonSamLogon
I_BrowserQueryStatistics
RxNetAccessDel
NetDfsGetDcAddress
NetapipBufferAllocate
kernel32
RegisterWaitForSingleObject
SetThreadPriority
WriteProfileStringA
GetConsoleAliasW
BaseInitAppcompatCacheSupport
GetShortPathNameA
lstrlenA
SetThreadIdealProcessor
GetNextVDMCommand
SetConsoleCursorMode
ConnectNamedPipe
HeapCreate
GetCPInfoExW
SetConsoleIcon
DnsHostnameToComputerNameW
LoadLibraryA
SearchPathW
DisconnectNamedPipe
GetConsoleAliasExesLengthW
lstrcat
GetNumberOfConsoleInputEvents
PrivCopyFileExW
GetAtomNameW
Process32Next
GetEnvironmentVariableW
SetLastError
GetProcessTimes
VirtualAlloc
LocalFree
GetConsoleProcessList
GetACP
PrivMoveFileIdentityW
InitializeCriticalSection
RegisterWaitForInputIdle
EnumDateFormatsW
GetFirmwareEnvironmentVariableW
OpenJobObjectA
GetStartupInfoW
GetNumaNodeProcessorMask
odbccp32
SQLConfigDataSource
SQLRemoveDriverManager
SQLInstallerErrorW
SQLInstallODBCW
SQLWritePrivateProfileString
SQLWriteDSNToIniW
SQLConfigDataSourceW
SelectTransDlg
SQLWriteFileDSN
SQLWritePrivateProfileStringW
SQLInstallDriverExW
SQLInstallDriver
SQLGetPrivateProfileString
SQLReadFileDSN
SQLPostInstallerError
SQLManageDataSources
SQLGetTranslator
SQLSetConfigMode
SQLGetInstalledDrivers
SQLCreateDataSourceExW
SQLCreateDataSource
SQLGetAvailableDriversW
ODBCCPlApplet
SQLGetAvailableDrivers
SQLRemoveDefaultDataSource
SQLRemoveDSNFromIniW
SQLInstallDriverManagerW
SQLConfigDriver
SQLCreateDataSourceEx
SQLValidDSNW
SQLGetPrivateProfileStringW
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ