Static task
static1
Behavioral task
behavioral1
Sample
e955fa06e3b7a52af73f42e70f9ec1d7e6766157fc209ddd03bc7c1bb7287cb7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e955fa06e3b7a52af73f42e70f9ec1d7e6766157fc209ddd03bc7c1bb7287cb7.exe
Resource
win10v2004-20220812-en
General
-
Target
e955fa06e3b7a52af73f42e70f9ec1d7e6766157fc209ddd03bc7c1bb7287cb7
-
Size
131KB
-
MD5
9e1cad6a302bc874f9524a18f7c31273
-
SHA1
92f958850c4a41704a9c33c04279102213539841
-
SHA256
e955fa06e3b7a52af73f42e70f9ec1d7e6766157fc209ddd03bc7c1bb7287cb7
-
SHA512
ec61bfb32e390bf185b621b30eb14cf28162d27b80300f94b4c10fce827506bb037f8bbfa9bd93655622ee93dade94511096323e2ee2bc012e90d483e48a7839
-
SSDEEP
1536:EjQahewhxtMgsxUWUqslAYJk/d6ZfqHPdQnD7M1JtV/W:4NemsxUWUqGTmqyHPdQnk1Jf/W
Malware Config
Signatures
Files
-
e955fa06e3b7a52af73f42e70f9ec1d7e6766157fc209ddd03bc7c1bb7287cb7.exe windows x86
7b15ac4f8ed8f9227863b8d8e58a44e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowA
PostMessageA
SetForegroundWindow
GetWindowThreadProcessId
GetWindowTextA
GetWindowLongA
GetSystemMetrics
GetWindowRect
GetForegroundWindow
wsprintfA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHFileOperationA
ShellExecuteA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
xsbio
IOFunctionFromDriver
netapi32
Netbios
ws2_32
sendto
closesocket
bind
htonl
htons
setsockopt
socket
shutdown
WSAGetLastError
gethostbyname
recvfrom
inet_ntoa
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wininet
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
msvcrt
strchr
strcmp
_purecall
_beginthreadex
strrchr
mktime
memcmp
_strcmpi
free
malloc
__dllonexit
_onexit
memcpy
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__CxxFrameHandler
time
_mbsicmp
memset
??2@YAPAXI@Z
memmove
strlen
atoi
sprintf
localtime
strftime
_exit
strcpy
_itoa
strcat
strstr
kernel32
OpenEventA
WritePrivateProfileStringA
GetModuleHandleA
CreateFileMappingA
MapViewOfFile
GetSystemDirectoryA
GetStartupInfoA
InitializeCriticalSection
UnmapViewOfFile
LeaveCriticalSection
SetFileAttributesA
ResetEvent
GetFileSize
CreateToolhelp32Snapshot
Process32First
Process32Next
GetLocalTime
FreeLibrary
LoadLibraryA
GetProcAddress
GetFileAttributesExA
ReadFile
SetFilePointer
SetEndOfFile
InterlockedExchange
Sleep
FindFirstFileA
FindNextFileA
FindClose
GetCurrentThread
SetThreadPriority
GetLogicalDrives
GetDriveTypeA
lstrlenA
CreateFileA
WriteFile
GetModuleFileNameA
GetPrivateProfileSectionNamesA
GetPrivateProfileIntA
SetEvent
CloseHandle
CreateEventA
WaitForSingleObject
ReleaseMutex
DeleteFileA
CreateMutexA
GetLastError
CreateProcessA
EnterCriticalSection
DeleteCriticalSection
GetFileAttributesA
GetTickCount
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ