Static task
static1
Behavioral task
behavioral1
Sample
a41100218dc3d47499b0099ff78f6a7e847e1ba435c4f204e42f38ce74b53248.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a41100218dc3d47499b0099ff78f6a7e847e1ba435c4f204e42f38ce74b53248.exe
Resource
win10v2004-20220812-en
General
-
Target
a41100218dc3d47499b0099ff78f6a7e847e1ba435c4f204e42f38ce74b53248
-
Size
256KB
-
MD5
95d6a56345979c0a3ff8a3b3ce6f7f0d
-
SHA1
eafad4b9bfcc002f21bc80e9d1b5404969d4a728
-
SHA256
a41100218dc3d47499b0099ff78f6a7e847e1ba435c4f204e42f38ce74b53248
-
SHA512
ff30555d30958a40aef76ddda746768552ecd1b624d747bc9fa091f028f42eaa36c95065e45cdc006e14000684b49912810d8a1d7ccb74f16ff73cfbbbbaa616
-
SSDEEP
6144:5qzbt23iL4N/6AoBHdy42qTcz/m7STXUqIG263LI:gzbt23iL4N/mBHF2qIaUTIG263c
Malware Config
Signatures
Files
-
a41100218dc3d47499b0099ff78f6a7e847e1ba435c4f204e42f38ce74b53248.exe windows x86
e3f7d7346e3f692afc3c2e4d157e94e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
ntohs
bind
accept
listen
recv
send
shutdown
select
connect
ioctlsocket
htons
WSAStartup
inet_addr
socket
gethostname
gethostbyname
getsockname
closesocket
mpr
WNetCancelConnection2A
WNetAddConnection2A
kernel32
CloseHandle
CreateThread
GetLastError
ConnectNamedPipe
Sleep
CreateNamedPipeA
CreateMutexA
ReleaseMutex
FlushFileBuffers
WriteFile
WaitForSingleObject
ReadFile
CreateFileA
DeviceIoControl
lstrlenA
GetModuleFileNameA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetFileSize
DeleteFileA
GetLocalTime
CreateDirectoryA
FindClose
FindNextFileA
FindFirstFileA
CreateEventA
WaitForMultipleObjects
GetTickCount
TerminateThread
SetEvent
GetTempFileNameA
InterlockedExchange
InitializeCriticalSectionAndSpinCount
lstrcpyA
EnterCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
ResetEvent
InterlockedExchangeAdd
lstrcmpiA
DisconnectNamedPipe
GetSystemDirectoryA
MoveFileExA
SetFilePointer
GetVersionExA
OpenProcess
GetCurrentProcessId
GetLongPathNameA
QueryDosDeviceA
GetComputerNameA
GetProcAddress
LoadLibraryA
SetEndOfFile
RemoveDirectoryA
MoveFileA
GetModuleHandleA
GetWindowsDirectoryA
GetSystemTimeAdjustment
GetSystemTime
VirtualProtect
GetMailslotInfo
CreateMailslotA
SetLastError
GlobalFree
TlsAlloc
TlsSetValue
lstrcatA
InitializeCriticalSection
TlsGetValue
GetStringTypeA
GetStringTypeW
GetFullPathNameA
GetCurrentDirectoryA
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
DeleteCriticalSection
GlobalAlloc
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetTimeZoneInformation
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapReAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetCurrentThreadId
user32
wsprintfA
advapi32
GetLengthSid
RegCreateKeyExA
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
LookupAccountNameA
LookupAccountSidA
OpenProcessToken
GetTokenInformation
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
OpenSCManagerA
LockServiceDatabase
OpenServiceA
DeleteService
CloseServiceHandle
UnlockServiceDatabase
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
IsValidSid
Sections
.text Size: 216KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE