Static task
static1
Behavioral task
behavioral1
Sample
b041090be33111041e2adac815c6dd0f8196097205120eff4fe2a3c53bf95ad3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b041090be33111041e2adac815c6dd0f8196097205120eff4fe2a3c53bf95ad3.exe
Resource
win10v2004-20220812-en
General
-
Target
b041090be33111041e2adac815c6dd0f8196097205120eff4fe2a3c53bf95ad3
-
Size
55KB
-
MD5
81b03cbcfc4b9d090cd8f5e5da816895
-
SHA1
6dd0f801c6148f02a14b048427e022b8fb9b7b1e
-
SHA256
b041090be33111041e2adac815c6dd0f8196097205120eff4fe2a3c53bf95ad3
-
SHA512
cdf38507cd89c72e63794b0899dec577c787c35bdca1bb1c3ba2925ddeef9397c72e988c198a79d537484ea60d5d6ee93f89d363c4f10a4194f2b6fc604549d0
-
SSDEEP
1536:/y5OeGo1BPSDQYM4oNr8+CY/v3XdlIbmvzeThIvrUolyRCfRa2d9OVD:mw2LCY/llQGzeavrUor02fOVD
Malware Config
Signatures
Files
-
b041090be33111041e2adac815c6dd0f8196097205120eff4fe2a3c53bf95ad3.exe windows x86
67bd577347c27541634483619f962b3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
LookupAccountSidA
GetTokenInformation
user32
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
RegisterClassExA
DispatchMessageA
LoadCursorA
wininet
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
HttpQueryInfoA
InternetReadFile
HttpOpenRequestA
InternetSetCookieA
HttpSendRequestA
InternetOpenA
InternetConnectA
InternetAttemptConnect
InternetCloseHandle
HttpAddRequestHeadersA
kernel32
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
GetProcessHeap
HeapAlloc
HeapFree
TerminateProcess
OpenProcess
GetCurrentProcess
GetLastError
GetModuleHandleA
GetProcAddress
GetModuleFileNameA
GetCurrentDirectoryA
SetFilePointer
WideCharToMultiByte
CreateFileA
GetFileSize
WriteFile
CreatePipe
GetStartupInfoA
CreateProcessA
CloseHandle
SetCurrentDirectoryA
WinExec
GetTickCount
Sleep
ReadFile
PeekNamedPipe
WaitForSingleObject
GetSystemTimeAsFileTime
msvcr90
_controlfp_s
_invoke_watson
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
??2@YAPAXI@Z
??3@YAXPAX@Z
sprintf
atoi
strstr
printf
malloc
memset
asctime_s
_localtime64_s
memcpy
_time64
_beginthread
atof
sscanf
rand
srand
_mbschr
_localtime64
_splitpath
free
realloc
strncmp
__CxxFrameHandler3
_CxxThrowException
atol
strncpy
_except_handler4_common
_amsg_exit
__getmainargs
_cexit
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ