Static task
static1
Behavioral task
behavioral1
Sample
a8df5ee5027864ac487f133742534e6453a95ae90d23f013c5e704db4b4c4dbb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a8df5ee5027864ac487f133742534e6453a95ae90d23f013c5e704db4b4c4dbb.exe
Resource
win10v2004-20221111-en
General
-
Target
a8df5ee5027864ac487f133742534e6453a95ae90d23f013c5e704db4b4c4dbb
-
Size
60KB
-
MD5
b6a4c7adf7be47fd91628116bf255de7
-
SHA1
ce51f28c1a4a7b62d451392e598e17a890dddfb1
-
SHA256
a8df5ee5027864ac487f133742534e6453a95ae90d23f013c5e704db4b4c4dbb
-
SHA512
bb20f37a2e604f8c85646787e83b87689b647f33ee5098de586398c9dd99fd75caabe4caad7ed734d21cb6ebf547211dbf2947bdeb6df4430138dc44a308babe
-
SSDEEP
768:FKk369jxpdIu1meEXh77Gl6iMPb8IT9WQ+mzclVGml:wh9j7dl1dmHGl6iib8FQLqGml
Malware Config
Signatures
Files
-
a8df5ee5027864ac487f133742534e6453a95ae90d23f013c5e704db4b4c4dbb.exe windows x86
2c6906a910ab9cf9e4f69120e8dbe437
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
ioctlsocket
send
recv
WSAGetLastError
WSAStartup
gethostbyname
connect
shutdown
closesocket
socket
setsockopt
htons
gethostname
msdhook
RunDlg
mfc42
ord6283
ord6282
ord5572
ord2915
ord801
ord541
ord4202
ord772
ord500
ord6142
ord5860
ord5606
ord860
ord539
ord4129
ord941
ord3663
ord5440
ord6383
ord2820
ord6394
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord668
ord1980
ord3178
ord4058
ord2781
ord2770
ord356
ord3337
ord540
ord858
ord535
ord6663
ord4278
ord6883
ord800
ord823
ord6143
ord5861
ord825
ord559
ord5862
ord812
ord537
ord1576
ord5450
ord1168
msvcrt
free
malloc
ftell
atol
sscanf
atoi
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
rand
sprintf
fseek
fread
_strlwr
strstr
_mbsicmp
_mbscmp
_CxxThrowException
wcslen
isgraph
__CxxFrameHandler
fopen
fwrite
fclose
time
_stricmp
_strnicmp
_setmbcp
srand
kernel32
CreateDirectoryA
Sleep
LocalFree
DeleteFileA
GetModuleHandleA
CreateMutexA
GetLastError
RemoveDirectoryA
GetStartupInfoA
CreateProcessA
GetVersionExA
InterlockedDecrement
InitializeCriticalSection
CreateThread
lstrlenA
WideCharToMultiByte
lstrcpynA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpyA
OpenProcess
CloseHandle
GetPriorityClass
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFileTime
SystemTimeToFileTime
CreateFileA
GetPrivateProfileStringA
GetSystemDirectoryA
LeaveCriticalSection
EnterCriticalSection
user32
IsWindow
GetWindowLongA
GetClassNameA
SendMessageA
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
FindWindowExW
FindWindowExA
EnumChildWindows
GetWindowTextA
advapi32
RegCloseKey
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
ole32
CoInitialize
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
oleacc
GetStateTextA
WindowFromAccessibleObject
AccessibleObjectFromWindow
GetRoleTextA
psapi
GetModuleFileNameExA
EnumProcessModules
shlwapi
PathFindFileNameA
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ