Static task
static1
Behavioral task
behavioral1
Sample
97b3c6d4b47312d990809ac0f88a6fccb2c03fdf94cbc97f44d571147c0bb45d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97b3c6d4b47312d990809ac0f88a6fccb2c03fdf94cbc97f44d571147c0bb45d.exe
Resource
win10v2004-20220901-en
General
-
Target
97b3c6d4b47312d990809ac0f88a6fccb2c03fdf94cbc97f44d571147c0bb45d
-
Size
20KB
-
MD5
7b16cf284b1ca78c11217a5dd1435a8b
-
SHA1
85151a10a262e14f0d96cea4a1e4d28b03f0791f
-
SHA256
97b3c6d4b47312d990809ac0f88a6fccb2c03fdf94cbc97f44d571147c0bb45d
-
SHA512
d24d5c9535dec623039d064848ce44ca1be3ae11f49b707ee20fa6bdacbfde350a31b6b28b4f33af22ec06e8afb3a41a800968e5ac57a5cff8e7a739e1298da7
-
SSDEEP
384:B2gbr2v39cim1Q4FulYyD1wBfeSGGGxzU1iU9sU2GhXa:ggbCcMYuyA1C+Y19oGhXa
Malware Config
Signatures
Files
-
97b3c6d4b47312d990809ac0f88a6fccb2c03fdf94cbc97f44d571147c0bb45d.exe windows x86
dab9289ca91fdd324cdd5a3e35912b84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord389
ord5207
ord825
ord924
ord2764
ord4129
ord858
ord800
ord5710
ord941
ord536
ord3178
ord4058
ord2781
ord668
ord610
ord2770
ord1187
ord818
ord567
ord3742
ord4424
ord4627
ord4080
ord3079
ord3825
ord690
ord3831
ord3830
ord3402
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord6055
ord2818
ord860
ord356
ord287
ord540
ord2915
ord6139
msvcrt
free
strlen
strcpy
atoi
memset
__CxxFrameHandler
_EH_prolog
strncpy
strcat
strtok
_strnicmp
memcpy
malloc
strcmp
sprintf
fclose
fwrite
fopen
fread
_stat
_except_handler3
kernel32
CreateFileA
GlobalUnlock
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
GlobalReAlloc
GetCurrentThreadId
GlobalSize
GlobalLock
GetDriveTypeA
WriteFile
PeekNamedPipe
GetLastError
ExitThread
DisconnectNamedPipe
DuplicateHandle
GetVersionExA
CreatePipe
WaitForMultipleObjects
TerminateThread
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
GetModuleHandleA
lstrcmpiA
CopyFileA
WinExec
LoadLibraryA
GetProcAddress
lstrlenA
lstrcatA
GetModuleFileNameA
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
OpenProcess
TerminateProcess
CloseHandle
DeleteFileA
GetSystemDirectoryA
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
ExitProcess
CreateThread
WaitForSingleObject
Sleep
user32
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
ReleaseDC
GetWindowDC
GetDesktopWindow
SetCursorPos
mouse_event
keybd_event
ExitWindowsEx
SetThreadDesktop
GetWindowRect
GetDC
MoveWindow
wsprintfA
EnableWindow
IsWindow
GetSystemMetrics
SendMessageA
SetWindowLongA
gdi32
GetObjectA
SelectPalette
RealizePalette
GetDIBits
GetStockObject
CreateCompatibleBitmap
DeleteObject
SelectObject
BitBlt
CreateCompatibleDC
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
avicap32
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrame
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICInfo
ws2_32
connect
WSAGetLastError
htons
inet_addr
WSAStartup
socket
send
closesocket
__WSAFDIsSet
select
recv
winmm
timeGetTime
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE