Static task
static1
Behavioral task
behavioral1
Sample
86dd8feef241458b2d5578bc1c7ee6b8ae7459049c8a26753efd50c7c547277a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
86dd8feef241458b2d5578bc1c7ee6b8ae7459049c8a26753efd50c7c547277a.exe
Resource
win10v2004-20220901-en
General
-
Target
86dd8feef241458b2d5578bc1c7ee6b8ae7459049c8a26753efd50c7c547277a
-
Size
120KB
-
MD5
d5a5a4d7912ff385e3eef916eaad0bc2
-
SHA1
a21a76c19e811cd7c70624f62cc8756afa004425
-
SHA256
86dd8feef241458b2d5578bc1c7ee6b8ae7459049c8a26753efd50c7c547277a
-
SHA512
bfd026ec272b524d44b6f61d42b6d6c3fffc0f9aca7f21215c8309386e2d9f438da1c532feebcca37033d6fa271cc1f930b0a15a8371a09f58469293c1c32e5a
-
SSDEEP
3072:uyFzkLU4xaoq0vW8Zeit2RG7wkoJoWF+i6o6OrxOCbJsUZ8:GY4x60e8ZRfDSoWF+i6/OrxOClsI8
Malware Config
Signatures
Files
-
86dd8feef241458b2d5578bc1c7ee6b8ae7459049c8a26753efd50c7c547277a.exe windows x86
38ae0e3e6178281a8c69ba2b6d7bb01d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
GetLastError
CreateRemoteThread
GetExitCodeProcess
DuplicateHandle
GetModuleHandleA
CreateThread
GetCurrentThreadId
GlobalUnlock
GlobalLock
GlobalAlloc
InterlockedIncrement
InterlockedDecrement
SetEvent
lstrlenW
GetModuleFileNameA
lstrcmpiA
Sleep
GetTickCount
lstrcmpA
MulDiv
GetLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileTime
CreateFileA
SetLastError
CreateMutexA
RemoveDirectoryA
CreateDirectoryA
GetTempPathA
GetCurrentProcessId
OpenProcess
MoveFileA
DeleteFileA
GetCommandLineA
GetStdHandle
AllocConsole
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedExchange
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
lstrcpyA
lstrcatA
ExpandEnvironmentStringsA
GetFileAttributesExA
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
GetCurrentProcess
FlushInstructionCache
WriteFile
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
WideCharToMultiByte
FreeConsole
MultiByteToWideChar
user32
RegisterWindowMessageA
MoveWindow
ShowWindow
BringWindowToTop
SetForegroundWindow
UnregisterClassA
SetWindowLongA
GetWindowLongA
SetWindowPos
IsWindowVisible
SendMessageA
GetClassInfoExA
LoadCursorA
DefWindowProcA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
PostThreadMessageA
CreateWindowExA
SendMessageTimeoutA
wsprintfA
MessageBoxA
GetMessageA
EnumWindows
EnumChildWindows
FindWindowExA
GetWindowThreadProcessId
AttachThreadInput
PostMessageA
SetCapture
GetDesktopWindow
SetFocus
GetWindow
DestroyAcceleratorTable
DestroyWindow
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
CreateAcceleratorTableA
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
CharNextA
GetSysColor
GetCursorPos
GetForegroundWindow
WindowFromPoint
SetLayeredWindowAttributes
IsWindow
GetWindowRect
GetFocus
ClientToScreen
PeekMessageA
TranslateMessage
DispatchMessageA
FillRect
CallWindowProcA
EndPaint
BeginPaint
GetClientRect
LoadBitmapA
RegisterClassExA
gdi32
CreateSolidBrush
GetDeviceCaps
CreateCompatibleBitmap
DeleteObject
GetObjectA
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetStockObject
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
ole32
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoTaskMemAlloc
OleLockRunning
StringFromGUID2
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
VariantClear
VariantInit
SysAllocStringLen
DispCallFunc
shlwapi
StrStrIW
PathFindFileNameA
StrToIntA
UrlUnescapeA
PathIsDirectoryA
PathRemoveBlanksA
PathRemoveFileSpecA
PathGetArgsA
PathFileExistsA
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
ws2_32
recv
__WSAFDIsSet
select
connect
ioctlsocket
htons
socket
WSAStartup
closesocket
gethostbyname
send
netapi32
Netbios
psapi
EnumProcesses
GetModuleFileNameExA
msvcr90
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
_except_handler4_common
rand
_beginthread
fseek
ftell
fread
calloc
strtok
realloc
_recalloc
??_V@YAXPAX@Z
strncpy
atoi
fopen
fwrite
fclose
_resetstkoflw
sprintf_s
memmove_s
??2@YAPAXI@Z
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
tolower
isalpha
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_stricmp
memset
sprintf
vsprintf
memcpy
__CxxFrameHandler3
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
memcpy_s
_CxxThrowException
malloc
strstr
free
??3@YAXPAX@Z
_crt_debugger_hook
_invoke_watson
_controlfp_s
__setusermatherr
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ