Static task
static1
Behavioral task
behavioral1
Sample
02c169c7320e3e87462845d4029918eb7f3c7cefa238420e7823215c9e6ffcb8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
02c169c7320e3e87462845d4029918eb7f3c7cefa238420e7823215c9e6ffcb8.exe
Resource
win10v2004-20221111-en
General
-
Target
02c169c7320e3e87462845d4029918eb7f3c7cefa238420e7823215c9e6ffcb8
-
Size
48KB
-
MD5
2db3d553f10b34bc548e0fc31d787e56
-
SHA1
f69e1c542512606e2f5ab91780bc8e83fe824b7f
-
SHA256
02c169c7320e3e87462845d4029918eb7f3c7cefa238420e7823215c9e6ffcb8
-
SHA512
c8b164a467d3ba76910891be0c52627674e165a39f00fc354313c7ea97b31b8ce9a13c69cc2bcdb36eb42f24628ae77f8c40948f80689967bf07010db5b5f041
-
SSDEEP
768:QXp/ZaFb9cCnZnxcfz0D3CvItD3nY/OqU/66Qy0s0:QXpInpxEz0+gtDYhU/ry
Malware Config
Signatures
Files
-
02c169c7320e3e87462845d4029918eb7f3c7cefa238420e7823215c9e6ffcb8.exe windows x86
22bce0fd4e66cb44347fd8acda09ef49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4261
ord3337
ord572
ord760
ord1161
ord5175
ord709
ord501
ord764
ord3641
ord3683
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord566
ord757
ord5182
ord4212
ord4735
ord4890
ord4580
ord2020
ord1671
ord1670
ord1551
ord5912
ord1401
ord5203
ord4262
ord3182
ord354
ord605
ord762
ord5975
ord3830
ord1126
ord310
ord578
ord1599
ord4108
ord4109
ord3997
ord2322
ord3648
ord3466
ord5165
ord5833
ord4265
ord2451
ord2902
ord784
ord297
ord1489
ord6118
ord299
ord2933
ord6006
ord1185
ord5715
ord5493
ord2703
ord3201
ord380
ord1903
ord4041
ord266
ord2003
ord2145
ord2144
ord4299
ord1230
ord1486
ord781
ord6138
ord2468
ord304
ord2246
ord1913
ord2615
ord5009
ord5012
ord4309
ord4135
ord2939
ord4904
ord943
ord5356
ord2992
ord2425
ord2424
ord4019
ord1557
ord3945
ord5148
ord5205
ord2173
ord1306
ord4277
ord746
ord751
ord635
ord558
ord562
ord395
ord745
ord744
ord1452
ord6310
ord911
ord5877
ord5346
ord5097
ord556
ord557
ord2272
ord1207
ord1655
ord1656
ord1964
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1402
ord3946
ord1617
ord1620
ord5915
ord876
ord3684
ord1084
msvcr71
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
__security_error_handler
__p__commode
__CxxFrameHandler
atoi
_localtime64
_setmbcp
wcslen
__p__fmode
__set_app_type
?terminate@@YAXXZ
free
_except_handler3
??0exception@@QAE@ABV0@@Z
_CxxThrowException
_time64
??0exception@@QAE@XZ
??1exception@@UAE@XZ
memset
_controlfp
kernel32
MultiByteToWideChar
GetLastError
InterlockedDecrement
GetVersionExA
LocalFree
LocalAlloc
WideCharToMultiByte
lstrlenA
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFileAttributesA
SetFileTime
CloseHandle
GetFileTime
CreateFileA
GetWindowsDirectoryA
Sleep
GetSystemDirectoryA
user32
LoadCursorA
EnableWindow
KillTimer
SetTimer
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
ole32
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleRun
oleaut32
SysAllocStringByteLen
SysStringByteLen
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
ws2_32
inet_ntoa
inet_addr
msvcp71
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
wininet
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
InternetOpenA
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ