Static task
static1
Behavioral task
behavioral1
Sample
d035f12c5926d0116c0818bbbc8231e0cd5e661dab2906c05349f80e23cd66c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d035f12c5926d0116c0818bbbc8231e0cd5e661dab2906c05349f80e23cd66c3.exe
Resource
win10v2004-20220901-en
General
-
Target
d035f12c5926d0116c0818bbbc8231e0cd5e661dab2906c05349f80e23cd66c3
-
Size
105KB
-
MD5
9045ec8f787db0ac5f69479b34b7380c
-
SHA1
18c2e11c6618d6c1e1f339e6cff4d4c62c593832
-
SHA256
d035f12c5926d0116c0818bbbc8231e0cd5e661dab2906c05349f80e23cd66c3
-
SHA512
2b59d1c0ed4e511c75f6cb18ad17ff2520d6f8cfe6af3f19a7e72518284cdc02d24652c54f2cc2cbc2c9498f0aeb8d4df812764a6e33cc98fcca437b760976bb
-
SSDEEP
3072:QiyPAERE/So/arIEKNDZQhutDBb/zpEPAh:Q/PAZAIEk+yDl/tEPAh
Malware Config
Signatures
Files
-
d035f12c5926d0116c0818bbbc8231e0cd5e661dab2906c05349f80e23cd66c3.exe windows x86
1a679f70d926161a52eb276bdd581639
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__assert
__errno
__getreent
__main
_fopen64
_impure_ptr
_stat64
abort
accept
bcopy
bind
calloc
close
connect
cygwin_internal
dll_crt0__FP11per_process
exit
fclose
fgets
fputc
fputs
free
getopt_long
getpagesize
getpid
getprogname
isatty
isspace
kill
listen
malloc
memcpy
memset
openlog
optarg
opterr
optind
optopt
pause
pthread_atfork
pthread_create
pthread_getspecific
pthread_key_create
pthread_mutex_lock
pthread_mutex_unlock
pthread_once
pthread_setspecific
read
realloc
shutdown
sigaction
snprintf
socket
strcasecmp
strcmp
strerror
strlen
strrchr
strtol
strtoul
syslog
time
unlink
write
advapi32
AccessCheck
AdjustTokenPrivileges
AllocateAndInitializeSid
EqualSid
GetKernelObjectSecurity
GetTokenInformation
ImpersonateNamedPipeClient
InitializeSecurityDescriptor
LookupPrivilegeValueA
MapGenericMask
OpenProcessToken
OpenThreadToken
RevertToSelf
SetSecurityDescriptorDacl
kernel32
AddAtomA
CloseHandle
ConnectNamedPipe
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DisconnectNamedPipe
DuplicateHandle
EnterCriticalSection
ExitThread
FindAtomA
FlushFileBuffers
GetAtomNameA
GetCurrentProcess
GetCurrentThread
GetExitCodeProcess
GetExitCodeThread
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetStdHandle
GetThreadPriority
GetVersionExA
InitializeCriticalSection
LeaveCriticalSection
OpenProcess
ReadFile
ReadProcessMemory
ReleaseSemaphore
ResetEvent
SetEvent
SetLastError
SetThreadPriority
Sleep
TerminateThread
WaitForMultipleObjects
WaitForSingleObject
WaitNamedPipeA
WriteFile
WriteProcessMemory
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 17KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE