Static task
static1
Behavioral task
behavioral1
Sample
8792825befad2275cf229288dbeec88475c907a0d2e333e8ceb39e59878b8eba.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8792825befad2275cf229288dbeec88475c907a0d2e333e8ceb39e59878b8eba.exe
Resource
win10v2004-20220812-en
General
-
Target
8792825befad2275cf229288dbeec88475c907a0d2e333e8ceb39e59878b8eba
-
Size
91KB
-
MD5
a65926cfe6efae7f3d1f16b2b6dbb77e
-
SHA1
9a194b20b47ddef97ad4c8b4b9c4e693f25e1361
-
SHA256
8792825befad2275cf229288dbeec88475c907a0d2e333e8ceb39e59878b8eba
-
SHA512
3ab6054e682c8bc425b93268bf354268f55cbc3e5d13b01f26c340fc946bc7cfaad14f48905859fb652512055b00bf81c082948bed0dd6e1d35ac312aeff6fcc
-
SSDEEP
1536:mVrLHRHGLg06vIdGgWYprXq0m4O5WbmCW4LtJ/tY2w2noYn:qHRHB06TvYprXQHEtBtYf27n
Malware Config
Signatures
Files
-
8792825befad2275cf229288dbeec88475c907a0d2e333e8ceb39e59878b8eba.exe windows x86
2af3d201bf9f5754f87d20f6e2fec0ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3742
ord801
ord818
ord541
ord567
ord4275
ord537
ord5861
ord823
ord2915
ord1168
ord6648
ord2764
ord5710
ord5683
ord2818
ord5572
ord1187
ord354
ord5186
ord6385
ord1979
ord665
ord389
ord5207
ord1988
ord690
ord1105
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord6055
ord540
ord860
ord535
ord825
ord800
ord4129
msvcrt
strncmp
_chkesp
_strnicmp
_strlwr
__CxxFrameHandler
free
fclose
malloc
fread
fopen
printf
_ftol
sprintf
fabs
strstr
atoi
_mbscmp
fwrite
rand
srand
time
_kbhit
system
exit
_except_handler3
_beep
__dllonexit
_onexit
??1type_info@@UAE@XZ
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
_XcptFilter
_exit
kernel32
DeviceIoControl
GlobalReAlloc
CreateToolhelp32Snapshot
Process32First
Process32Next
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
MultiByteToWideChar
WideCharToMultiByte
HeapFree
CreateDirectoryA
GetModuleFileNameA
lstrlenA
CreateMutexA
WritePrivateProfileStringA
WinExec
PeekNamedPipe
ReadFile
CreatePipe
DuplicateHandle
CreateProcessA
WaitForMultipleObjects
DisconnectNamedPipe
GlobalAlloc
GetModuleHandleA
GetProcAddress
GetProcessHeap
HeapAlloc
GetTickCount
GetCurrentProcessId
GetComputerNameA
GetVersion
GetVersionExA
GlobalMemoryStatus
GetSystemInfo
GetPrivateProfileStringA
lstrcmpiA
GetSystemDirectoryA
FindResourceA
SizeofResource
LoadResource
LockResource
CreateFileA
WriteFile
CreateThread
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
VirtualFreeEx
GetCurrentProcess
GetLastError
Sleep
FindClose
lstrcmpA
FindNextFileA
FindFirstFileA
lstrcatA
lstrcpyA
GetDriveTypeA
RemoveDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetTempPathA
CloseHandle
OpenProcess
TerminateProcess
GlobalUnlock
GlobalLock
GlobalSize
GlobalFree
WaitForSingleObject
TerminateThread
ExitThread
user32
EnumWindows
PostMessageA
FindWindowA
GetDesktopWindow
GetSystemMetrics
FindWindowExA
GetWindowTextA
GetWindowLongA
EnumChildWindows
EnableWindow
SystemParametersInfoA
MessageBoxA
ReleaseDC
GetWindowThreadProcessId
GetClassNameA
GetWindowDC
GetDC
SetCursorPos
mouse_event
keybd_event
ShowWindow
wsprintfA
SetWindowTextA
SetWindowPos
SendMessageA
IsWindow
GetWindowRect
DestroyWindow
ExitWindowsEx
SetRect
gdi32
GetStockObject
SelectPalette
RealizePalette
CreateCompatibleBitmap
BitBlt
GetObjectA
CreateCompatibleDC
SelectObject
GetDIBits
CreateDCA
DeleteObject
advapi32
QueryServiceStatus
RegCreateKeyExA
GetUserNameA
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
AddAce
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
RegOpenKeyA
CloseServiceHandle
CreateServiceA
StartServiceA
OpenServiceA
ControlService
DeleteService
OpenSCManagerA
ChangeServiceConfigA
UnlockServiceDatabase
LockServiceDatabase
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
QueryServiceConfigA
EnumServicesStatusA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
ws2_32
select
gethostbyname
closesocket
socket
inet_addr
htons
connect
recv
send
WSAGetLastError
htonl
WSASocketA
setsockopt
WSAStartup
sendto
inet_ntoa
winmm
mciSendStringA
timeGetTime
iphlpapi
GetAdaptersInfo
netapi32
NetApiBufferFree
NetUserGetLocalGroups
psapi
GetProcessMemoryInfo
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
GetModuleFileNameExA
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
HttpQueryInfoA
InternetGetConnectedState
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ