Static task
static1
Behavioral task
behavioral1
Sample
0744c5a2347147caf971ae0761da50e20e6505e7ea60968820a218c9c70c57ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0744c5a2347147caf971ae0761da50e20e6505e7ea60968820a218c9c70c57ed.exe
Resource
win10v2004-20220812-en
General
-
Target
0744c5a2347147caf971ae0761da50e20e6505e7ea60968820a218c9c70c57ed
-
Size
1.1MB
-
MD5
e56c15b2c6fd48d881ead9acd5f3352b
-
SHA1
bec8b75f2c7beb89bd7e5ac44adb5ec9fa2db9cf
-
SHA256
0744c5a2347147caf971ae0761da50e20e6505e7ea60968820a218c9c70c57ed
-
SHA512
04e3b412dbce07f12408b70c80b79592001f00a8e0f6cc350c907da616a989d2f6607486d43850575dc3e5066035a5e7da023ebf03d917df78883076725cd109
-
SSDEEP
24576:6c1gsju6u5h8NkvwT9DTggWgYLgKs+9jn6bjBv6OSNH8HXA:oMnzCjn6vBv6OscHX
Malware Config
Signatures
Files
-
0744c5a2347147caf971ae0761da50e20e6505e7ea60968820a218c9c70c57ed.exe windows x86
40c5fe05d7a085ffe421bb9901f27fe5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateEventA
FreeConsole
SetThreadPriority
GetCurrentThread
LocalFree
FormatMessageA
CreateNamedPipeA
ConnectNamedPipe
GetVersionExA
DisconnectNamedPipe
CancelIo
GetModuleFileNameA
ResumeThread
LocalAlloc
GetProcAddress
LoadLibraryExA
FreeLibrary
ReadFile
WriteFile
WaitForSingleObject
SetEvent
GetLastError
CreateFileA
WaitNamedPipeA
SetNamedPipeHandleState
CloseHandle
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
lstrlenA
lstrcpyA
GetTimeZoneInformation
RaiseException
TlsAlloc
UnlockFile
LockFile
SetEnvironmentVariableW
SetCurrentDirectoryA
DeleteFileA
CreateDirectoryA
LocalFileTimeToFileTime
SetFileTime
SystemTimeToFileTime
GetFileInformationByHandle
RemoveDirectoryA
PeekNamedPipe
GetModuleHandleA
GetFullPathNameA
GetLocaleInfoW
SetEndOfFile
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringW
CompareStringA
LoadLibraryA
CreateSemaphoreA
InterlockedDecrement
ReleaseSemaphore
GetWindowsDirectoryA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapFree
HeapAlloc
InterlockedExchangeAdd
GetSystemTime
GetLocalTime
SetConsoleCtrlHandler
CreateThread
TlsSetValue
ExitThread
GetFileAttributesA
GetCommandLineA
GetVersion
FlushFileBuffers
GetSystemTimeAsFileTime
SetFilePointer
HeapReAlloc
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
MoveFileA
GetCurrentDirectoryA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
RtlUnwind
GetDriveTypeA
SetFileAttributesA
SetLastError
TlsGetValue
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetStringTypeA
HeapSize
SetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeW
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
user32
MessageBoxA
PeekMessageA
KillTimer
SetTimer
advapi32
QueryServiceConfigA
QueryServiceStatus
SetServiceStatus
RegisterServiceCtrlHandlerA
OpenServiceA
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
StartServiceCtrlDispatcherA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCloseKey
RegEnumValueA
RegOpenKeyExA
wsock32
recv
getservbyname
accept
getsockname
send
getpeername
htonl
select
setsockopt
ntohs
WSACleanup
inet_addr
WSAStartup
gethostname
bind
listen
connect
shutdown
closesocket
htons
socket
ioctlsocket
gethostbyname
WSAGetLastError
gethostbyaddr
Sections
.text Size: 796KB - Virtual size: 795KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 231KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE