Static task
static1
Behavioral task
behavioral1
Sample
c07dae5623aeb7cf2e2712f50c453829937357e53ed69a4e394e71bc43c7a8e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c07dae5623aeb7cf2e2712f50c453829937357e53ed69a4e394e71bc43c7a8e3.exe
Resource
win10v2004-20221111-en
General
-
Target
c07dae5623aeb7cf2e2712f50c453829937357e53ed69a4e394e71bc43c7a8e3
-
Size
131KB
-
MD5
a35180d117e59dd7bfc39362ddf7df4d
-
SHA1
cdb62f01da33fa1a62e1a6a0e3251bbef1699e40
-
SHA256
c07dae5623aeb7cf2e2712f50c453829937357e53ed69a4e394e71bc43c7a8e3
-
SHA512
9daf4a9527411fd922b95aa2e1d283bc8b95e56eafd943e9334696754238684efc8707c2f25344818d923e6845843806e9d1099bc03b162789b3df0dad572809
-
SSDEEP
1536:rnm4lxLgsxUWUeo4pdd/B+xKCCFD+81JcV/WohQ3dPUh7:TmUWsxUWU0Hd9CK1J+/W53dPUh7
Malware Config
Signatures
Files
-
c07dae5623aeb7cf2e2712f50c453829937357e53ed69a4e394e71bc43c7a8e3.exe windows x86
07fa194d8a0da095d44d4c4143310a85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowA
PostMessageA
SetForegroundWindow
GetWindowThreadProcessId
GetWindowTextA
GetWindowLongA
GetSystemMetrics
GetWindowRect
GetForegroundWindow
wsprintfA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHFileOperationA
ShellExecuteA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
xsbio
IOFunctionFromDriver
netapi32
Netbios
ws2_32
sendto
closesocket
bind
htonl
htons
setsockopt
socket
shutdown
WSAGetLastError
gethostbyname
recvfrom
inet_ntoa
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wininet
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
msvcrt
strchr
strcmp
_purecall
_beginthreadex
strrchr
memcpy
mktime
_strcmpi
strstr
free
malloc
__dllonexit
memset
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
strcat
??2@YAPAXI@Z
memmove
strlen
atoi
sprintf
localtime
strftime
strcpy
__CxxFrameHandler
_onexit
time
_itoa
memcmp
kernel32
OpenEventA
WritePrivateProfileStringA
GetModuleHandleA
CreateFileMappingA
MapViewOfFile
GetSystemDirectoryA
GetStartupInfoA
lstrlenA
UnmapViewOfFile
DeleteCriticalSection
SetFileAttributesA
ResetEvent
FindFirstFileA
GetFileSize
FindNextFileA
FindClose
CreateToolhelp32Snapshot
Process32First
Process32Next
GetLocalTime
FreeLibrary
LoadLibraryA
GetProcAddress
GetLogicalDrives
GetFileAttributesExA
GetDriveTypeA
DeleteFileA
ReadFile
SetFilePointer
SetEndOfFile
InterlockedExchange
Sleep
CreateMutexA
CreateFileA
WriteFile
GetModuleFileNameA
GetPrivateProfileSectionNamesA
GetPrivateProfileIntA
SetEvent
CloseHandle
CreateEventA
WaitForSingleObject
ReleaseMutex
GetFileAttributesA
GetLastError
CreateProcessA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetTickCount
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ