Static task
static1
Behavioral task
behavioral1
Sample
5f5c10a45a191d5eaaf3bbf9655ce3000683f065916f1a6b404a7fce83bfa137.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5f5c10a45a191d5eaaf3bbf9655ce3000683f065916f1a6b404a7fce83bfa137.exe
Resource
win10v2004-20221111-en
General
-
Target
5f5c10a45a191d5eaaf3bbf9655ce3000683f065916f1a6b404a7fce83bfa137
-
Size
300KB
-
MD5
a6ab3bdc44aa07cfbc5542c57ef2bdbc
-
SHA1
1d157e4f18f40909fcccc8cd4b0aed0c01964170
-
SHA256
5f5c10a45a191d5eaaf3bbf9655ce3000683f065916f1a6b404a7fce83bfa137
-
SHA512
ad0f48eb939729ae999ebeb28623f04fcfeb9b1f4f3aa542049215e276eb54ebe6c709e301c76174dd797bd45447e1bfacde78aa0f28a827a02b6c828ee40d8d
-
SSDEEP
3072:HJAIGz9/OYBddCxQ5Pe7xkUDKfEZegklCaHY5WAfD:pAIGx/OYnIxQdY6UGfVgklCaHYWAf
Malware Config
Signatures
Files
-
5f5c10a45a191d5eaaf3bbf9655ce3000683f065916f1a6b404a7fce83bfa137.exe windows x86
87c7168f981ca8ce3b0192e99c03b1cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEABDI@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??0logic_error@std@@QAE@ABV01@@Z
??0out_of_range@std@@QAE@ABV01@@Z
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??5std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@0@AAV10@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??Bios_base@std@@QBEPAXXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
msvcrt
printf
??2@YAPAXI@Z
??0exception@@QAE@ABV0@@Z
_CxxThrowException
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
atol
memset
time
srand
strlen
malloc
strcpy
__CxxFrameHandler
rand
kernel32
CreateProcessA
GetCommandLineA
GetModuleHandleA
GetProcAddress
LoadLibraryA
ExitProcess
GetStartupInfoA
lstrcmpA
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 264KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cqchsvk Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE