Static task
static1
Behavioral task
behavioral1
Sample
cd0262e4a819155f13160a8ae94718457113bb11ea898edef3b244ca8daa0385.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd0262e4a819155f13160a8ae94718457113bb11ea898edef3b244ca8daa0385.exe
Resource
win10v2004-20220812-en
General
-
Target
cd0262e4a819155f13160a8ae94718457113bb11ea898edef3b244ca8daa0385
-
Size
163KB
-
MD5
6a5c16c8dd3c71eae82a3ac0a5c1ee87
-
SHA1
57d1c313570bf41c6bbf3238b9101537acc953c4
-
SHA256
cd0262e4a819155f13160a8ae94718457113bb11ea898edef3b244ca8daa0385
-
SHA512
0eb4ad92f8af44cbf2d0dd119dee6b36d6d637d6937dd0c037f149071e717f88ae5df0f3c61b82ace88db9b0a20282b1b79f633d1a4a2da3f8e15b02be7bd94a
-
SSDEEP
3072:aA8RHYTrKRLsX+2t7VGKrIBci6A7J6KOGK+/9HoqOZ47+ff:AZG9nGIIOip7HOGK69HKZ4
Malware Config
Signatures
Files
-
cd0262e4a819155f13160a8ae94718457113bb11ea898edef3b244ca8daa0385.exe windows x86
05a60b89aa82827f95573b5d32f1811d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_itoa
_strnicmp
_CxxThrowException
??1type_info@@UAE@XZ
__CxxFrameHandler
memmove
strcpy
_rotr
_rotl
_vsnprintf
memcmp
tolower
strcmp
printf
??2@YAPAXI@Z
??3@YAXPAX@Z
vsprintf
_beginthreadex
_except_handler3
ceil
_ftol
exit
realloc
strncmp
_snprintf
strstr
sscanf
atoi
fseek
fread
fopen
fclose
fwrite
ftell
strcat
memset
clock
sprintf
strncpy
memcpy
free
malloc
strlen
_strcmpi
ws2_32
connect
__WSAFDIsSet
accept
shutdown
setsockopt
bind
send
getpeername
ioctlsocket
socket
inet_ntoa
gethostbyaddr
WSAGetLastError
getservbyport
select
closesocket
WSASetLastError
htons
gethostbyname
getsockname
inet_addr
recv
htonl
sendto
WSACleanup
recvfrom
WSAIoctl
gethostname
WSAStartup
listen
kernel32
GetVersionExA
GetLocaleInfoA
SetCurrentDirectoryA
lstrlenA
GetWindowsDirectoryA
CreateFileA
GetFileTime
SetFileTime
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
ExitProcess
CopyFileA
GetLastError
WriteFile
SearchPathA
CreatePipe
GetCurrentProcess
GetComputerNameA
CreateProcessA
PeekNamedPipe
GetExitCodeProcess
ReadFile
GetModuleHandleA
GetModuleFileNameA
OpenProcess
ReadProcessMemory
Sleep
TerminateProcess
CloseHandle
SetFileAttributesA
DeleteFileA
LocalFree
CreateThread
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GlobalMemoryStatus
GetDiskFreeSpaceExA
GetDriveTypeA
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
IsBadCodePtr
TerminateThread
InitializeCriticalSection
GetCurrentProcessId
EnterCriticalSection
DuplicateHandle
SetErrorMode
CreateMutexA
lstrcpyA
lstrcpynA
GetEnvironmentVariableA
lstrcmpA
LeaveCriticalSection
user32
GetForegroundWindow
IsCharAlphaNumericA
wsprintfA
GetWindowTextA
FindWindowA
SendMessageA
advapi32
RegEnumValueA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
GetUserNameA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegCloseKey
shell32
ShellExecuteA
oleaut32
GetErrorInfo
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE