Static task
static1
Behavioral task
behavioral1
Sample
86f15ea22e55d184f00d7d2f7543b31c650bd3b6cdabb7f9af72ce54e5cd7505.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86f15ea22e55d184f00d7d2f7543b31c650bd3b6cdabb7f9af72ce54e5cd7505.exe
Resource
win10v2004-20220812-en
General
-
Target
86f15ea22e55d184f00d7d2f7543b31c650bd3b6cdabb7f9af72ce54e5cd7505
-
Size
14KB
-
MD5
bf213ac4a2d3f5792ac1f3dccd960397
-
SHA1
5d80ae60a9ecc34519b28248407482a88ab173de
-
SHA256
86f15ea22e55d184f00d7d2f7543b31c650bd3b6cdabb7f9af72ce54e5cd7505
-
SHA512
c04f9d788443d948f8ad910cd72e2527bf75a11ebbb21fa3f0a7cf3fdc8327198abd65ba07491f6bf2c8ca791e7eba5d5a5bf2c8c676a7fecaa4eed308780419
-
SSDEEP
192:Tt6gfCKNZ9/q62XsF3/ET70GgahlZfvFA9vzJQhbjpBS1mhWoUqU/f5T:TAgTCW8MbanZfvqg30/f5
Malware Config
Signatures
Files
-
86f15ea22e55d184f00d7d2f7543b31c650bd3b6cdabb7f9af72ce54e5cd7505.exe windows x86
002a7f6443511e842d4ca601c05906f1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateThread
CreateMutexA
GetVersionExA
lstrcmpiA
lstrcatA
DeleteFileA
lstrcpyA
GetTempFileNameA
GetTempPathA
Sleep
WinExec
lstrlenA
GetTickCount
ReadFile
SetFilePointer
CreateFileA
WriteFile
CloseHandle
GetCurrentProcess
GetSystemDirectoryA
user32
FindWindowA
wsprintfA
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegSetValueExA
RegCreateKeyA
RegCloseKey
wininet
InternetReadFile
InternetCloseHandle
DeleteUrlCacheEntry
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
msvcp60
??1_Winit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
shell32
ShellExecuteA
msvcrt
strcat
atol
__CxxFrameHandler
_itoa
_except_handler3
_onexit
__dllonexit
sprintf
strcpy
strlen
memcpy
memset
malloc
strchr
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls0 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.reloc Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ