Static task
static1
Behavioral task
behavioral1
Sample
a5b09785fc3a6c2c0cc67230fc5c314c3845ed399805fe50909226aed1fb5547.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5b09785fc3a6c2c0cc67230fc5c314c3845ed399805fe50909226aed1fb5547.exe
Resource
win10v2004-20220812-en
General
-
Target
a5b09785fc3a6c2c0cc67230fc5c314c3845ed399805fe50909226aed1fb5547
-
Size
147KB
-
MD5
ce0807f09a17f2227a2ebe30e2b29c21
-
SHA1
823cb5376de4e87ccd4d4cc1a9666d8cc1d7845d
-
SHA256
a5b09785fc3a6c2c0cc67230fc5c314c3845ed399805fe50909226aed1fb5547
-
SHA512
f202674a2409fb5b5c389fd7a010a2b0458a1e2f68704c7c08f680e0700ca836cd56ed56c3f5e1ec633c904c12a41a3cca4460e634b3f256d3fbe506f3d44524
-
SSDEEP
3072:BNv4swq4mATq1hx8tvbovFYlL4Hp7ek5NLX8gsicGKyKvm933B1KqQ:z8qNATzqFPp7v5m7K0vsY
Malware Config
Signatures
Files
-
a5b09785fc3a6c2c0cc67230fc5c314c3845ed399805fe50909226aed1fb5547.exe windows x86
925823ec92632c62367b49eeebb616d7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
odbc32
SQLDriverConnectA
SQLError
SearchStatusCode
SQLTables
SQLSpecialColumnsW
SQLGetDiagRecA
SQLColumnPrivilegesW
SQLExecDirectW
PostODBCComponentError
SQLFetch
SQLNativeSqlW
SQLForeignKeysW
SQLProcedureColumnsA
SQLTablesW
SQLStatistics
kernel32
RegisterWowExec
HeapValidate
CreateWaitableTimerA
FindNextVolumeW
LocalFlags
GetConsoleCommandHistoryLengthW
GetExitCodeThread
GetOverlappedResult
SetConsoleInputExeNameW
GetConsoleAliasExesA
SetConsoleNumberOfCommandsW
GetThreadTimes
GetWindowsDirectoryW
PostQueuedCompletionStatus
GetFileSize
EnumResourceTypesW
ReadConsoleInputExW
SetTimeZoneInformation
InterlockedPopEntrySList
OpenFileMappingW
GetNamedPipeInfo
GetConsoleFontSize
GetEnvironmentStrings
GetModuleHandleExW
lstrcat
SetComputerNameExA
WaitForSingleObjectEx
VirtualQuery
GetBinaryTypeW
HeapCreate
GetCPInfoExA
ReadProcessMemory
ReleaseActCtx
WTSGetActiveConsoleSessionId
GetCommProperties
AddConsoleAliasA
GetOEMCP
ReleaseSemaphore
DnsHostnameToComputerNameA
GetModuleHandleExA
Toolhelp32ReadProcessMemory
GetStringTypeExW
DeleteFileA
SetThreadPriorityBoost
GetFullPathNameW
LoadLibraryW
SetConsoleCursorPosition
SetStdHandle
FormatMessageW
DebugBreakProcess
TransactNamedPipe
CreateNamedPipeW
CreateSemaphoreW
GetCompressedFileSizeW
CloseHandle
QueueUserWorkItem
GetLogicalDriveStringsA
RemoveDirectoryW
RegisterConsoleOS2
GetDriveTypeW
SetConsoleTitleW
secur32
LsaDeregisterLogonProcess
InitializeSecurityContextW
LsaLookupAuthenticationPackage
SaslIdentifyPackageW
GetUserNameExW
SetContextAttributesW
QueryCredentialsAttributesW
LsaGetLogonSessionData
QuerySecurityPackageInfoA
InitSecurityInterfaceA
SaslEnumerateProfilesW
InitSecurityInterfaceW
GetComputerObjectNameA
ImportSecurityContextA
SaslGetProfilePackageA
SetContextAttributesA
SealMessage
DecryptMessage
LsaRegisterPolicyChangeNotification
SaslInitializeSecurityContextW
QueryCredentialsAttributesA
AddCredentialsA
DeleteSecurityPackageA
InitializeSecurityContextA
ApplyControlToken
SaslAcceptSecurityContext
SecpFreeMemory
FreeCredentialsHandle
EnumerateSecurityPackagesA
SecpTranslateNameEx
msvcirt
?tie@ios@@QAEPAVostream@@PAV2@@Z
?tellg@istream@@QAEJXZ
??_Eistream@@UAEPAXI@Z
??_Eistream_withassign@@UAEPAXI@Z
?stossc@streambuf@@QAEXXZ
??_Distrstream@@QAEXXZ
??_Gostrstream@@UAEPAXI@Z
?setb@streambuf@@IAEXPAD0H@Z
?lockc@ios@@KAXXZ
??5istream@@QAEAAV0@AAI@Z
??4ostream_withassign@@QAEAAVostream@@ABV1@@Z
??_7ifstream@@6B@
?blen@streambuf@@IBEHXZ
crtdll
iswctype
fsetpos
wcsncpy
_fileinfo_dll
_commit
_wcsdup
atan2
_local_unwind2
_mbspbrk
_spawnvpe
_getpid
_read
_cprintf
qsort
_ismbcprint
_wcsicoll
_strtime
tmpnam
_mbstrlen
_ltoa
memcpy
__iscsym
_errno
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ