Static task
static1
Behavioral task
behavioral1
Sample
a43fd58aeaa644a983dfecc95f38d4cd9a6e817b6107d1a392fe02f1ac87083b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a43fd58aeaa644a983dfecc95f38d4cd9a6e817b6107d1a392fe02f1ac87083b.exe
Resource
win10v2004-20220812-en
General
-
Target
a43fd58aeaa644a983dfecc95f38d4cd9a6e817b6107d1a392fe02f1ac87083b
-
Size
76KB
-
MD5
fdb53d25405f60cffaa52ddcdd003d79
-
SHA1
10703c6fe678fd5347f6d952acdc74a9fdacb9c2
-
SHA256
a43fd58aeaa644a983dfecc95f38d4cd9a6e817b6107d1a392fe02f1ac87083b
-
SHA512
dd4305e21c586cbc0fdc93dd92c62081df0bd46d223781fac616bead48a593fd052e72c3d341b1958a775b8582d49d1083c159b7fdd8ef3b8eb8ee2c7b97a382
-
SSDEEP
768:mSVZkjOg05Vl9geYhgKmyoDpK3FNfmOJWAigPRFnToIf1/DhnIAN:mSVmjO55VAhM/6fmOp7FnToIf/
Malware Config
Signatures
Files
-
a43fd58aeaa644a983dfecc95f38d4cd9a6e817b6107d1a392fe02f1ac87083b.exe windows x86
1275e2bfd1cc61814a80e5e7d2fdde2d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
DeleteUrlCacheEntry
kernel32
TerminateProcess
VirtualFree
VirtualProtect
VirtualAlloc
CheckRemoteDebuggerPresent
ExitProcess
IsDebuggerPresent
GetWindowsDirectoryA
SetThreadPriority
GetCurrentThread
GetFileSize
CreateFileA
WriteFile
GetModuleFileNameA
MoveFileExA
lstrcpynA
FreeConsole
WinExec
GetSystemInfo
GetModuleHandleA
GetVersionExA
GetCurrentThreadId
CreateToolhelp32Snapshot
WaitForSingleObject
Process32First
Module32First
OpenProcess
ReadFile
CreateEventA
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
CloseHandle
CreatePipe
FreeLibrary
GetProcAddress
LoadLibraryA
FindClose
FindNextFileA
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
DeleteFileA
CopyFileA
MoveFileA
GetCurrentProcess
Sleep
GetPriorityClass
Process32Next
user32
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
CloseWindowStation
GetSystemMetrics
FindWindowA
mouse_event
ExitWindowsEx
keybd_event
SetCursorPos
PostMessageA
EnumWindows
GetWindowTextLengthA
IsWindowVisible
GetWindowTextA
GetDesktopWindow
wsprintfA
gdi32
SelectObject
CreateCompatibleDC
GetDIBits
DeleteObject
CreateDCA
BitBlt
CreateCompatibleBitmap
DeleteDC
advapi32
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegOpenKeyA
RegDeleteValueA
RegCloseKey
SetServiceStatus
DeleteService
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
QueryServiceStatus
ControlService
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
SHGetFileInfoA
msvcr71
free
atoi
strcspn
__CxxFrameHandler
_beginthreadex
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
_acmdln
_amsg_exit
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
_strcmpi
malloc
__getmainargs
??2@YAPAXI@Z
??3@YAXPAX@Z
exit
strncat
sprintf
strncpy
_except_handler3
strstr
avicap32
capGetDriverDescriptionA
ws2_32
closesocket
shutdown
setsockopt
connect
socket
inet_addr
WSACleanup
WSAStartup
recv
send
WSAIoctl
htons
gethostbyname
shlwapi
StrStrIA
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ