Static task
static1
Behavioral task
behavioral1
Sample
b49a17170bb6871fd983ace209a9e4d01229825b0b0a13564011b2448496cb9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b49a17170bb6871fd983ace209a9e4d01229825b0b0a13564011b2448496cb9f.exe
Resource
win10v2004-20220812-en
General
-
Target
b49a17170bb6871fd983ace209a9e4d01229825b0b0a13564011b2448496cb9f
-
Size
164KB
-
MD5
de1f97fb143aedbe185ec2b935723b5a
-
SHA1
855b21421e1278a89fb4e85c0270b3b33ac847b6
-
SHA256
b49a17170bb6871fd983ace209a9e4d01229825b0b0a13564011b2448496cb9f
-
SHA512
27eb20664a5247035edca089722a498582b66d4b9bad95bb42230d19b11ff3c52c52c9c777b684044bc5fcc7ec137b894203400c7e0f6b102c68b07da14adc5a
-
SSDEEP
3072:OBd/ssGYvT+qKN+/h7Ov8f86qk9W9ZOQfJtkposRbgK:OrrG/N+/hC8fQk9Wv5frkpqK
Malware Config
Signatures
Files
-
b49a17170bb6871fd983ace209a9e4d01229825b0b0a13564011b2448496cb9f.exe windows x86
bd430eae9212028abb2b09c990866306
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
TerminateProcess
WaitForSingleObject
CreateProcessA
WinExec
DuplicateHandle
GetCurrentProcess
OpenProcess
GetProcAddress
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
Sleep
FreeLibrary
WideCharToMultiByte
GetSystemDirectoryA
GetFileAttributesExA
SetFileTime
CloseHandle
GetVersionExA
CreateFileA
GetLastError
WriteFile
user32
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
RegisterClassExA
ShowWindow
CreateWindowExA
DefWindowProcA
PostQuitMessage
DispatchMessageA
GetDesktopWindow
TranslateMessage
RegisterWindowMessageA
SendMessageTimeoutA
EnumWindows
GetMessageA
advapi32
LookupAccountNameA
CreateServiceA
StartServiceA
OpenServiceA
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
DeleteService
ConvertSidToStringSidA
GetUserNameA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
fwrite
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??2@YAPAXI@Z
??3@YAXPAX@Z
_access
fopen
_strlwr
rand
wcslen
atoi
strchr
strstr
__CxxFrameHandler
sprintf
srand
time
fclose
fflush
shlwapi
SHGetValueA
SHSetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ