Static task
static1
Behavioral task
behavioral1
Sample
74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe
Resource
win10v2004-20221111-en
General
-
Target
74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4
-
Size
18KB
-
MD5
cf10800f44769adb7fa525144b9bc112
-
SHA1
162e236956778f48dad90b57798e9c3d84059aee
-
SHA256
74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4
-
SHA512
67b51c9e589016189a95fbc67a7bb7aa77465f514885e3d96424418358582752139e40183962d580ac52ff7629c1d3ff6fb7c7f69d04e95f8d1f1b1f6c338210
-
SSDEEP
384:+qh9iywwHkhoTT45gMkmKk7GY1ISpZWwnU4OF1O:d3iy5NM1kmp7GY1RKwnU4ObO
Malware Config
Signatures
Files
-
74a0e6da85b94805b9d18cba20714843350ad807d5d7c9398eb4d90c9114d7f4.exe windows x86
f0f88caceaf1f05662bd6c1019d39401
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetComputerNameA
WaitForSingleObject
FindClose
FindNextFileA
GetCurrentThreadId
lstrcmpA
FindFirstFileA
GetModuleHandleA
lstrlenA
lstrcatA
GetStartupInfoA
lstrcpyA
lstrcmpiA
FileTimeToSystemTime
Sleep
user32
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
LoadIconA
DefWindowProcA
EndDialog
SetWindowPos
GetMessageA
PostThreadMessageA
GetInputState
LoadCursorA
gdi32
GetStockObject
advapi32
GetUserNameA
msvcrt
__CxxFrameHandler
atol
sprintf
strtok
rand
sscanf
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_except_handler3
__p__fmode
__set_app_type
_controlfp
??3@YAXPAX@Z
??2@YAPAXI@Z
srand
__p__commode
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Xlen@std@@YAXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
ws2_32
gethostbyname
WSACleanup
WSAStartup
dbghelp
MakeSureDirectoryPathExists
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE