Static task
static1
Behavioral task
behavioral1
Sample
4b73f4fd8eae9df57c1f6b16b1dc43cb10eadfde74d95312616476f228bd024d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b73f4fd8eae9df57c1f6b16b1dc43cb10eadfde74d95312616476f228bd024d.exe
Resource
win10v2004-20221111-en
General
-
Target
4b73f4fd8eae9df57c1f6b16b1dc43cb10eadfde74d95312616476f228bd024d
-
Size
128KB
-
MD5
2966c1e4d029b82b0e2dd2e2cc904133
-
SHA1
327b6c71de8d284843dee21b8208cd0be3ad98f9
-
SHA256
4b73f4fd8eae9df57c1f6b16b1dc43cb10eadfde74d95312616476f228bd024d
-
SHA512
d6d91552b8d9e876c1ce5249b2c9d4ceb711fa4dd3af3654920853692d8b70914f9d49306a12a59d5f4af875f8a8c5a6a412630c8c9973c4856fb42a3888c2f0
-
SSDEEP
1536:ipZI7Rbl5VqBLTr8M2dhkSUAgzmfzbcygqHi/1B2Phhr+ptP+cLMQtfsR8o:oZS5l50J8M2d2S/oqThhr+P+LQVsR8o
Malware Config
Signatures
Files
-
4b73f4fd8eae9df57c1f6b16b1dc43cb10eadfde74d95312616476f228bd024d.exe windows x86
95ad9e7393e97829c86b72923f0beba0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_strcmpi
__dllonexit
??1type_info@@UAE@XZ
calloc
_beginthreadex
clock
realloc
strchr
strncat
exit
printf
time
srand
atoi
rand
strncpy
strcat
strcpy
strcmp
strrchr
_except_handler3
malloc
free
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
strstr
strlen
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
_strnicmp
_onexit
ws2_32
gethostbyname
htons
connect
socket
WSACleanup
WSAStartup
closesocket
select
ntohs
setsockopt
send
inet_addr
sendto
htonl
inet_ntoa
WSAGetLastError
gethostname
getsockname
recv
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
mfc42
ord537
ord6648
ord2764
ord4129
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord2818
ord939
ord6877
ord800
ord540
kernel32
WaitForMultipleObjects
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
SetFileAttributesA
CopyFileA
CreateMutexA
LocalSize
Process32Next
Process32First
lstrcmpiA
GetModuleHandleA
GetStartupInfoA
CreateToolhelp32Snapshot
PeekNamedPipe
TerminateProcess
DisconnectNamedPipe
CreatePipe
GetSystemDirectoryA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetProcessHeap
HeapFree
GetModuleFileNameA
OutputDebugStringA
WinExec
TerminateThread
GetTickCount
CreateThread
OpenProcess
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetProcAddress
LoadLibraryA
CloseHandle
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetLogicalDriveStringsA
FindClose
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
SetLastError
GetCurrentProcess
HeapAlloc
user32
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorInfo
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetWindowTextA
SetClipboardData
CloseClipboard
SetCursorPos
WindowFromPoint
SetCapture
mouse_event
MapVirtualKeyA
SystemParametersInfoA
SendMessageA
DestroyCursor
LoadCursorA
wsprintfA
CharNextA
EnumWindows
CloseDesktop
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
GetClipboardData
SetThreadDesktop
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
advapi32
LookupPrivilegeValueA
LookupAccountSidA
CreateServiceA
StartServiceCtrlDispatcherA
SetServiceStatus
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
OpenProcessToken
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
RegEnumValueA
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
GetTokenInformation
shell32
SHGetSpecialFolderPathA
wininet
InternetOpenUrlA
msvfw32
ICOpen
ICSeqCompressFrameEnd
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICClose
ICCompressorFree
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ