Static task
static1
Behavioral task
behavioral1
Sample
b51f57c4f49a4046349d7b1dced4af9a83ad901b10793fdda3ece1f7a5e2cc86.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b51f57c4f49a4046349d7b1dced4af9a83ad901b10793fdda3ece1f7a5e2cc86.exe
Resource
win10v2004-20221111-en
General
-
Target
b51f57c4f49a4046349d7b1dced4af9a83ad901b10793fdda3ece1f7a5e2cc86
-
Size
88KB
-
MD5
308ef21bd1b49248577590c4a0f59d42
-
SHA1
f1c99bec326d62448a36e7a1a354ae494a6e86f6
-
SHA256
b51f57c4f49a4046349d7b1dced4af9a83ad901b10793fdda3ece1f7a5e2cc86
-
SHA512
c3eb9dfeed9773c841c6e27c3f2c4aa0804fec3020c801b88d9be64be87758e293e7024c65be65979b0d12428dfc84261eefe18c2e6e08b850d2192cf41a0469
-
SSDEEP
1536:FgWQMtWO1ljjFwQY/WvcbWjf4dy0gwonB1:FrH4O1l/FwQqWvAWD4dy0gwonB1
Malware Config
Signatures
Files
-
b51f57c4f49a4046349d7b1dced4af9a83ad901b10793fdda3ece1f7a5e2cc86.exe windows x86
d519cef5ca52b561fdba5450152eddf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
GetModuleFileNameA
ExitProcess
GetLastError
CreateMutexA
CopyFileA
GetSystemDirectoryA
GetEnvironmentVariableA
OpenProcess
Process32Next
CloseHandle
WriteFile
CreateFileA
GetModuleHandleA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MultiByteToWideChar
Sleep
MoveFileA
LocalAlloc
FindFirstFileA
LocalFree
FindClose
GetProcAddress
GetLogicalDriveStringsA
GetVolumeInformationA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
InterlockedExchange
lstrcpyA
ResetEvent
LeaveCriticalSection
LoadLibraryA
GetStartupInfoA
user32
DestroyCursor
SendMessageA
SystemParametersInfoA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
LoadCursorA
ReleaseDC
GetCursorPos
GetCursorInfo
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
GetWindowTextA
EnumWindows
CloseDesktop
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CharNextA
MessageBoxA
GetDesktopWindow
wsprintfA
advapi32
RegEnumKeyExA
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegQueryValueExA
RegEnumValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
OpenServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
OpenSCManagerA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
msvcrt
wcscpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
calloc
_beginthreadex
rand
strncat
exit
??1type_info@@UAE@XZ
_errno
strchr
strcat
strncpy
strncmp
atoi
strcpy
strcmp
strrchr
??3@YAXPAX@Z
memcpy
memmove
ceil
_ftol
strlen
strstr
__CxxFrameHandler
memset
??2@YAPAXI@Z
memcmp
free
malloc
_except_handler3
ws2_32
select
send
inet_ntoa
inet_addr
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
recv
ntohs
closesocket
WSAStartup
WSACleanup
WSAIoctl
socket
gethostbyname
connect
setsockopt
htons
netapi32
NetLocalGroupAddMembers
NetUserAdd
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ