Static task
static1
Behavioral task
behavioral1
Sample
f620c6c87993ddabad55f867c1534373f8c9f15c4330245a8ee3ad3619b1fa0a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f620c6c87993ddabad55f867c1534373f8c9f15c4330245a8ee3ad3619b1fa0a.exe
Resource
win10v2004-20220812-en
General
-
Target
f620c6c87993ddabad55f867c1534373f8c9f15c4330245a8ee3ad3619b1fa0a
-
Size
161KB
-
MD5
70b34f6f76726313cc4c6182c748d6b0
-
SHA1
e425156e58a958abb7e6b67927895f91e6fe5601
-
SHA256
f620c6c87993ddabad55f867c1534373f8c9f15c4330245a8ee3ad3619b1fa0a
-
SHA512
b6528a202f5a1bd02cb226e86348e39489d8389ac03130d24300091845e5a8d92606874159788a26db81d1e69357e392b621459d5bf5420ca03cdd01dc859c66
-
SSDEEP
3072:lfuYoStlVE77RgQkvT6hP1vIBOASc7UORxiClb5hjnlLDh:ZrpE77RgQkitvefRcClF9lPh
Malware Config
Signatures
Files
-
f620c6c87993ddabad55f867c1534373f8c9f15c4330245a8ee3ad3619b1fa0a.exe windows x86
ae8889112798d053a3a0f99e388e12c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
sqlunirl
_FindResource@12
_WaitNamedPipe_@8
_WritePrivateProfileStruct_@20
_BuildCommDCB_@8
_PostThreadMessage_@16
_DefDlgProc_@16
_GetDateFormat_@24
_GetTextMetrics@8
_GetPrivateProfileString_@24
_RegSetValue_@20
_CopyFileEx_@24
_GetEnvironmentStrings_@4
_lstrcmp_@8
_GetUserName@8
_LoadLibrary@4
_GetMenuItemInfo_@16
_CharUpperBuff_@8
_DlgDirSelectComboBoxEx_@16
_OpenEvent_@12
_RegQueryValueEx_@24
_LoadImage_@24
_EnumFonts_@16
_SHGetPathFromIDList_@8
_GetTextExtentPoint@16
_OpenEventLog_@8
_CreateDesktop_@24
_FindWindowEx_@16
_GetWindowsDirectory_@8
_ReportEvent_@36
newMultiByteFromWideCharSize
_GetPrivateProfileInt_@16
sqlsrv32
BCP_columns
BCP_init
SQLMoreResults
SQLGetData
BCP_control
ConnectDlgProc
SQLNumParams
SQLGetDescRecW
WizIntSecurityDlgProc
SQLGetDescFieldW
SQLRowCount
SQLGetConnectAttrW
SQLPrepareW
SQLBindCol
BCP_readfmt
BCP_collen
SQLProceduresW
SQLBrowseConnectW
SQLDescribeParam
kernel32
LocalAlloc
UnregisterWait
OpenJobObjectW
RemoveLocalAlternateComputerNameW
RtlMoveMemory
GetStartupInfoW
InterlockedIncrement
CreateJobSet
GetOEMCP
ReadConsoleOutputCharacterW
FindResourceExW
GetBinaryTypeW
ReadConsoleOutputA
EnumLanguageGroupLocalesW
GetFirmwareEnvironmentVariableA
EnumSystemLanguageGroupsW
GetExitCodeThread
LoadLibraryW
GetVolumePathNamesForVolumeNameA
GetConsoleTitleA
SetThreadContext
RaiseException
GetCurrentDirectoryA
GlobalFindAtomA
user32
RegisterClassA
PostQuitMessage
DefWindowProcA
msvcrt
__set_app_type
_get_osfhandle
_wunlink
__unDName
_get_sbh_threshold
_endthreadex
__p__commode
exit
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
mblen
__getmainargs
__p__iob
_setjmp
_mbsnbicoll
shlwapi
PathIsFileSpecA
DelayLoadFailureHook
StrNCatW
SHRegEnumUSKeyA
SHRegGetPathW
StrCatBuffA
PathRelativePathToA
UrlHashA
msls31
LssbGetNumberDnodesInSubline
LsDestroyContext
LsdnFinishByOneChar
LsFindNextBreakSubline
LsQueryFLineEmpty
LsDisplaySubline
LsGetWarichuLsimethods
LsDestroyLine
LsEnumSubline
LsdnResolvePrevTab
LsSetBreaking
LsdnFinishRegular
LsQueryLineCpPpoint
LsGetReverseLsimethods
LssbFDonePresSubline
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ