?DllGetVersion@@YAHPAU_DllVersionInfo@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
a8d129ea2915712ce72fb79e6d27b1bf747fa16ab8b5170ca46ad658d2c223ab.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a8d129ea2915712ce72fb79e6d27b1bf747fa16ab8b5170ca46ad658d2c223ab.exe
Resource
win10v2004-20220812-en
General
-
Target
a8d129ea2915712ce72fb79e6d27b1bf747fa16ab8b5170ca46ad658d2c223ab
-
Size
352KB
-
MD5
d7506ffbfd4d132723ab353d1836e30b
-
SHA1
600f2a6f32549755e1ee3676a4034990de9bd4d4
-
SHA256
a8d129ea2915712ce72fb79e6d27b1bf747fa16ab8b5170ca46ad658d2c223ab
-
SHA512
a66953bae62c31bd80053560cc0e1554f8886410b8580abeec96b8c0f7a45b02d5df4801e82db72097b93f3edb381567ab78311dd6c2ec11b0414715f7dadae7
-
SSDEEP
6144:J+/2f4zXAFRG6dEqw4PXeFgYra6x14LJn8FyHhXEv:JHf4TmCqw4Pz8/x14BcyHhS
Malware Config
Signatures
Files
-
a8d129ea2915712ce72fb79e6d27b1bf747fa16ab8b5170ca46ad658d2c223ab.exe windows x86
cf0baa24cc021ca2a96e17c12a9efb48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
connect
WSAStartup
WSAGetLastError
htons
WSACleanup
recv
socket
gethostbyname
send
kernel32
EnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
GetCurrentProcessId
LocalFree
FindResourceA
GetLocaleInfoA
LoadResource
GlobalLock
WaitForSingleObject
GetCommandLineA
FindResourceExA
GlobalAlloc
WideCharToMultiByte
SizeofResource
CreateProcessA
GetModuleFileNameW
CompareStringW
GetACP
MultiByteToWideChar
RaiseException
InterlockedExchange
GetThreadLocale
LockResource
CompareStringA
GetVersionExA
GetLastError
SetEnvironmentVariableA
GlobalReAlloc
CreateThread
SetEndOfFile
RtlUnwind
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
FlushFileBuffers
UnhandledExceptionFilter
GetCPInfo
GetOEMCP
SetFilePointer
GetStdHandle
SetHandleCount
WriteFile
GetCurrentDirectoryA
GetDriveTypeA
ReadFile
CreateFileA
GetFileType
SetStdHandle
GetTimeZoneInformation
VirtualFree
LeaveCriticalSection
Sleep
InitializeCriticalSection
FormatMessageA
GetStringTypeA
CloseHandle
GetStringTypeW
LCMapStringA
LCMapStringW
LoadLibraryA
GetProcessHeap
HeapCreate
HeapDestroy
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
HeapFree
HeapAlloc
HeapSize
DeleteFileA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateDirectoryA
RemoveDirectoryA
GetTimeFormatA
GetDateFormatA
GetFullPathNameA
GetSystemTimeAsFileTime
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
ResumeThread
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
user32
DestroyWindow
GetMessageA
SetActiveWindow
CreateDialogParamA
DdeCreateStringHandleA
DdeGetLastError
SetForegroundWindow
DdeInitializeA
GetClientRect
GetDC
TranslateMessage
GetWindowTextA
MessageBoxA
BringWindowToTop
PeekMessageA
ReleaseDC
GetDlgItem
SetWindowPos
ShowWindow
DispatchMessageA
DdeClientTransaction
DdeConnect
DdeNameService
SetWindowTextA
GetCursorPos
gdi32
DeleteObject
SelectObject
GetBkColor
CreatePen
CreateSolidBrush
Polygon
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteExA
Exports
Exports
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ