Static task
static1
Behavioral task
behavioral1
Sample
75dc68fa19fab7fc01aa1c4ed3526c46578c987fb1167d6c4765ad8893811a41.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
75dc68fa19fab7fc01aa1c4ed3526c46578c987fb1167d6c4765ad8893811a41.exe
Resource
win10v2004-20220812-en
General
-
Target
75dc68fa19fab7fc01aa1c4ed3526c46578c987fb1167d6c4765ad8893811a41
-
Size
108KB
-
MD5
0a84b1ead55b289de490792febd157d0
-
SHA1
db0c2c9d3e6e4deea5ca75292a4dbe4cd6e8a205
-
SHA256
75dc68fa19fab7fc01aa1c4ed3526c46578c987fb1167d6c4765ad8893811a41
-
SHA512
d2ab21e48996a0c4b33b45243ed8cfb9a98e44202ff6162de16d8e0b288ef3ba263685a5476ce970c1aae8c830cab2d54c1162d9aa1e7b9869238241d89da71f
-
SSDEEP
3072:acUeAmBAwhbm15tTBf1DGSo1CUgv9YpDAY:TUz0i15tTBxI1CUaYV
Malware Config
Signatures
Files
-
75dc68fa19fab7fc01aa1c4ed3526c46578c987fb1167d6c4765ad8893811a41.exe windows x86
be594ae36f1e94854a77e1f716a83ad4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
DeleteUrlCacheEntry
kernel32
VirtualFree
VirtualProtect
VirtualAlloc
CheckRemoteDebuggerPresent
ExitProcess
IsDebuggerPresent
GetWindowsDirectoryA
SetThreadPriority
GetCurrentThread
Sleep
GetFileSize
CreateFileA
WriteFile
TerminateProcess
WinExec
GetModuleFileNameA
MoveFileExA
lstrcpynA
FreeConsole
GetVersionExA
GetComputerNameA
GetCurrentThreadId
CreateToolhelp32Snapshot
GetModuleHandleA
Process32First
Module32First
OpenProcess
GetPriorityClass
Process32Next
GetCurrentProcess
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
LoadLibraryA
GetProcAddress
FreeLibrary
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CreateEventA
ReadFile
WaitForSingleObject
user32
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
GetSystemMetrics
FindWindowA
ExitWindowsEx
keybd_event
SetCursorPos
mouse_event
PostMessageA
EnumWindows
GetWindowTextLengthA
IsWindowVisible
GetWindowTextA
GetDesktopWindow
wsprintfA
gdi32
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
CreateDCA
BitBlt
SelectObject
DeleteDC
GetDIBits
advapi32
StartServiceCtrlDispatcherA
RegOpenKeyA
RegDeleteValueA
RegCloseKey
SetServiceStatus
DeleteService
OpenSCManagerA
OpenServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
ControlService
QueryServiceStatus
ChangeServiceConfigA
RegisterServiceCtrlHandlerA
shell32
SHGetFileInfoA
ShellExecuteA
msvcr71
_beginthreadex
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
_acmdln
_amsg_exit
__getmainargs
_initterm
atoi
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
_strcmpi
strcspn
malloc
free
??2@YAPAXI@Z
??3@YAXPAX@Z
exit
strncat
sprintf
strncpy
_except_handler3
strstr
__CxxFrameHandler
avicap32
capGetDriverDescriptionA
ws2_32
shutdown
setsockopt
connect
socket
htons
closesocket
WSAStartup
gethostbyname
recv
send
WSAIoctl
WSACleanup
inet_addr
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ