Static task
static1
Behavioral task
behavioral1
Sample
96e47498224d8fc15dbcdaf97035153d176e752d83894c813a364fe5cd443f89.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96e47498224d8fc15dbcdaf97035153d176e752d83894c813a364fe5cd443f89.exe
Resource
win10v2004-20221111-en
General
-
Target
96e47498224d8fc15dbcdaf97035153d176e752d83894c813a364fe5cd443f89
-
Size
60KB
-
MD5
7598e0485805d58ccd24c4028f4ff756
-
SHA1
75f90b7d34e02672fba54d23cefb833b444c3ec3
-
SHA256
96e47498224d8fc15dbcdaf97035153d176e752d83894c813a364fe5cd443f89
-
SHA512
d0ccf8f73ca9b7b666e85b36800dac91eeba680e55da02f01c866764cc66b3e58f172bc5ca93c1c29a6d6dccdb20fb14ca8205dff02f2ce8b6cc3a4984c573fe
-
SSDEEP
1536:n/Avpelzbax6zVqTKNJXsSzcEUcVFFKZ3vhKaZ+MjF:n/ARel6x6zVquNRsSzcEUcVFFKZ/hKaX
Malware Config
Signatures
Files
-
96e47498224d8fc15dbcdaf97035153d176e752d83894c813a364fe5cd443f89.exe windows x86
f30c49315a977aa505a919235ef6edd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetClipboardData
EmptyClipboard
OpenClipboard
VkKeyScanA
BringWindowToTop
EnumWindows
GetWindowTextA
FindWindowA
IsWindow
SendMessageA
FindWindowExA
CharLowerA
wsprintfA
BlockInput
SetForegroundWindow
SetFocus
ShowWindow
keybd_event
CloseClipboard
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
kernel32
WideCharToMultiByte
SetFilePointer
GetStartupInfoA
CreateMutexA
ExpandEnvironmentStringsA
ReleaseMutex
TerminateThread
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GlobalFree
GetSystemTime
GetFileSize
ReadFile
GetVersionExA
GetLocaleInfoA
CreateProcessA
WaitForSingleObject
lstrcmpiA
ExitProcess
GlobalUnlock
GlobalLock
GlobalAlloc
CopyFileA
GetWindowsDirectoryA
ExitThread
Sleep
GetModuleFileNameA
GetTickCount
InterlockedDecrement
SetFileAttributesA
GetModuleHandleA
FindClose
FindNextFileA
lstrcatA
lstrlenA
GetFullPathNameA
SetCurrentDirectoryA
FindFirstFileA
GetDriveTypeA
GetProcAddress
LoadLibraryA
GetFileAttributesA
CloseHandle
WriteFile
CreateFileA
DeleteFileA
GetLastError
CreateDirectoryA
GetLogicalDriveStringsA
FreeLibrary
GetCurrentProcess
lstrcpynA
lstrcmpA
lstrcpyA
GetComputerNameA
CreateThread
GetTempPathA
msvcrt
wcslen
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
strcpy
strlen
rand
memcpy
sprintf
memset
strcat
strchr
srand
__CxxFrameHandler
??2@YAPAXI@Z
strncpy
memcmp
strstr
rename
fopen
fread
malloc
fclose
fgets
strcmp
free
_vsnprintf
strtok
_snprintf
atoi
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
GetUserNameA
OpenProcessToken
ws2_32
closesocket
connect
ioctlsocket
socket
urlmon
URLDownloadToFileA
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE