Static task
static1
Behavioral task
behavioral1
Sample
9017c404213737eda2ee78115f999f1e7f2e76e3b6261d3d1e0859908683eb2a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9017c404213737eda2ee78115f999f1e7f2e76e3b6261d3d1e0859908683eb2a.exe
Resource
win10v2004-20220812-en
General
-
Target
9017c404213737eda2ee78115f999f1e7f2e76e3b6261d3d1e0859908683eb2a
-
Size
269KB
-
MD5
2b6b199888ca502cdb0f9ad47593bb40
-
SHA1
a8f82d814849781379a812a12d26551ade69737e
-
SHA256
9017c404213737eda2ee78115f999f1e7f2e76e3b6261d3d1e0859908683eb2a
-
SHA512
d7dd616ba908394fc586df653cf1c4454f1d5034ccf3c2769bfa18dfc33860c226a8028afdd12fa0f59232f4c1e2bb7ce150699cc1766a37679d1f019fbceed7
-
SSDEEP
6144:dsC7hJ9u2ILCkyzc9Zwk/vVSuSMt0KTPPQJCxs9ZoZ0YwQnDsJKyz8TRdsFlCGle:dFtJQ2kC1Uwk/vr0KTPP+Cxs9ZoKY7Q+
Malware Config
Signatures
Files
-
9017c404213737eda2ee78115f999f1e7f2e76e3b6261d3d1e0859908683eb2a.exe windows x86
a17bb57b7e8869b4d2e87493e13e8e8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_strupr
_beginthreadex
memcpy
calloc
_CIacos
printf
_CIpow
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_access
rand
wcscpy
vsprintf
strcat
exit
fopen
fwrite
fclose
strrchr
_except_handler3
free
strcmp
strcpy
malloc
memcmp
memset
??3@YAXPAX@Z
__CxxFrameHandler
??2@YAPAXI@Z
memmove
_ftol
_chkesp
strlen
??1type_info@@UAE@XZ
_CxxThrowException
atoi
wcstombs
wcslen
strncat
mbstowcs
kernel32
lstrlenA
InterlockedExchange
LocalAlloc
FreeLibrary
LocalFree
WideCharToMultiByte
GetStartupInfoA
GetModuleHandleA
GetExitCodeThread
TerminateThread
CreateThread
RaiseException
MultiByteToWideChar
GetLastError
InterlockedDecrement
SetEvent
WaitForSingleObject
LoadLibraryA
GetProcAddress
CloseHandle
Sleep
CreateEventA
user32
IsWindow
SendMessageA
CreateWindowExA
GetMessageA
PostThreadMessageA
ws2_32
ntohs
closesocket
select
send
gethostname
getsockname
WSAStartup
connect
htons
gethostbyname
socket
recv
setsockopt
WSACleanup
msvcp60
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ole32
CoInitialize
CLSIDFromProgID
CLSIDFromString
OleRun
CoCreateInstance
CoUninitialize
oleaut32
GetErrorInfo
VariantClear
SysAllocString
SysFreeString
msvfw32
ICSendMessage
Sections
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 253KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ