Static task
static1
Behavioral task
behavioral1
Sample
f1bbc6281d383ba2445d99eb73c61784dd80dcce0e1a757e64ad98b31017dbd4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f1bbc6281d383ba2445d99eb73c61784dd80dcce0e1a757e64ad98b31017dbd4.exe
Resource
win10v2004-20220812-en
General
-
Target
f1bbc6281d383ba2445d99eb73c61784dd80dcce0e1a757e64ad98b31017dbd4
-
Size
103KB
-
MD5
1c2504342bae83ad3b3117a1bb006d49
-
SHA1
6474f12b70b3e1600d87aee579ffff85b58ffa50
-
SHA256
f1bbc6281d383ba2445d99eb73c61784dd80dcce0e1a757e64ad98b31017dbd4
-
SHA512
aff53cbac6d7fdf214aee85fb215f06aef688dd121523ac56eb0b42b32924d11d2503881947d88a48150a3e0abac33c194ff8cee76170964eb7b74aeccc7f307
-
SSDEEP
3072:RPdr+jYj8SjylT4IX3bzJ+Dhf7fx933ppD3m:tMcj8SI4Dfv35c
Malware Config
Signatures
Files
-
f1bbc6281d383ba2445d99eb73c61784dd80dcce0e1a757e64ad98b31017dbd4.exe windows x86
92d32c96aa2a3e6d97f6114a7dc919d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
inet_ntoa
__WSAFDIsSet
gethostbyaddr
WSAStartup
WSACleanup
getprotobyname
WSAAsyncSelect
sendto
bind
listen
getsockname
select
accept
htonl
ntohl
htons
socket
connect
send
recv
closesocket
WSAGetLastError
ioctlsocket
gethostname
gethostbyname
kernel32
GetCPInfo
GetOEMCP
GetACP
FlushFileBuffers
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetStdHandle
GetStdHandle
SetHandleCount
QueryPerformanceCounter
QueryPerformanceFrequency
lstrlenA
SetFileAttributesA
CloseHandle
ReadFile
CreateFileA
lstrcpynA
GetFileAttributesA
SetThreadPriority
CreateThread
SetPriorityClass
GetCurrentProcess
Sleep
GetProcAddress
LoadLibraryA
GetVersionExA
FindClose
FindNextFileA
lstrcpyA
FindFirstFileA
DeleteFileA
WriteFile
SetFilePointer
GetFileSize
WaitForSingleObject
WritePrivateProfileStringA
VirtualProtect
GetPrivateProfileStringA
GetTickCount
CopyFileA
GetModuleFileNameA
GetModuleHandleA
CreateDirectoryA
MoveFileA
GetDiskFreeSpaceA
GetDriveTypeA
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
lstrcatA
LocalFree
LocalAlloc
lstrcmpiA
TerminateProcess
OpenProcess
CreateProcessA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjects
ResumeThread
PeekNamedPipe
HeapSize
SetEndOfFile
ExitProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetCommandLineA
GetStartupInfoA
GetFileType
GetLastError
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
VirtualQuery
RtlUnwind
InterlockedExchange
GetCurrentThreadId
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetLocaleInfoA
GetSystemDirectoryA
CreatePipe
user32
CharUpperA
CreateDialogParamA
LoadAcceleratorsA
PostThreadMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
PeekMessageA
GetMessageA
wsprintfA
PostMessageA
GetWindowRect
SetWindowPos
SetForegroundWindow
PostQuitMessage
MessageBoxA
SetTimer
GetForegroundWindow
KillTimer
ExitWindowsEx
GetWindow
GetWindowTextA
IsWindowVisible
GetDesktopWindow
advapi32
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
GetUserNameA
RegQueryValueExA
LookupPrivilegeValueA
shell32
SHFileOperationA
ShellExecuteA
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ