Static task
static1
Behavioral task
behavioral1
Sample
b9675ffc541fbc89739220f9aad9cfc7d60081fe0a134630370758ee80ef2eae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9675ffc541fbc89739220f9aad9cfc7d60081fe0a134630370758ee80ef2eae.exe
Resource
win10v2004-20220812-en
General
-
Target
b9675ffc541fbc89739220f9aad9cfc7d60081fe0a134630370758ee80ef2eae
-
Size
47KB
-
MD5
f156221b8e7483301fe9f5e7e069f105
-
SHA1
ee0082a025f26489680735dd198a3a987b91210b
-
SHA256
b9675ffc541fbc89739220f9aad9cfc7d60081fe0a134630370758ee80ef2eae
-
SHA512
166b4da74a260ef8e2e299ddf026c66375f536a4fca19080418c1daec3afb66de9dd688a696cdad8a97493ccd66e30db013aaade02d99ef81a3d096acfe02c40
-
SSDEEP
768:T610R3BtDgg43ncTQW8L/wYxZQ8U25zku5mF2pfsL+qW/Mpv:00RxA3ncTQpYYbprGu5mmsv
Malware Config
Signatures
Files
-
b9675ffc541fbc89739220f9aad9cfc7d60081fe0a134630370758ee80ef2eae.exe windows x86
c8833e925185dc972809ad75462a30e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp71
?_Nomemory@std@@YAXXZ
user32
IsWindow
FindWindowA
GetWindowTextA
EnumWindows
SendMessageA
FindWindowExA
CloseClipboard
SetClipboardData
EmptyClipboard
CharLowerA
wsprintfA
BringWindowToTop
keybd_event
SetForegroundWindow
SetFocus
ShowWindow
VkKeyScanA
OpenClipboard
BlockInput
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
kernel32
GetTempPathA
GetFileSize
GetStartupInfoA
WideCharToMultiByte
ExpandEnvironmentStringsA
CreateMutexA
ReleaseMutex
TerminateThread
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GlobalFree
CreateThread
SetFilePointer
ReadFile
GetSystemTime
GetVersionExA
GetLocaleInfoA
CreateProcessA
WaitForSingleObject
lstrcmpiA
GlobalUnlock
GlobalLock
GlobalAlloc
CopyFileA
GetWindowsDirectoryA
InterlockedDecrement
ExitThread
Sleep
GetModuleFileNameA
GetTickCount
SetFileAttributesA
GetModuleHandleA
FindClose
FindNextFileA
lstrcatA
lstrlenA
GetFullPathNameA
SetCurrentDirectoryA
FindFirstFileA
GetDriveTypeA
GetProcAddress
LoadLibraryA
GetFileAttributesA
CloseHandle
WriteFile
CreateFileA
DeleteFileA
GetLastError
CreateDirectoryA
GetLogicalDriveStringsA
FreeLibrary
GetCurrentProcess
lstrcpynA
lstrcmpA
lstrcpyA
GetComputerNameA
ExitProcess
msvcr71
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
strcpy
strlen
rand
memcpy
sprintf
memset
strcat
??_V@YAXPAX@Z
??3@YAXPAX@Z
__CxxFrameHandler
strchr
srand
strncpy
memcmp
strstr
rename
fopen
fread
malloc
fclose
fgets
strcmp
free
_vsnprintf
strtok
_snprintf
atoi
_callnewh
_except_handler3
wcslen
__dllonexit
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
GetUserNameA
OpenProcessToken
ws2_32
closesocket
connect
ioctlsocket
socket
urlmon
URLDownloadToFileA
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE