Static task
static1
Behavioral task
behavioral1
Sample
c80e2d5c10d0594bb61013ad23dbf5c5dd4c26052bf1f550ada4f514618554ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c80e2d5c10d0594bb61013ad23dbf5c5dd4c26052bf1f550ada4f514618554ac.exe
Resource
win10v2004-20220812-en
General
-
Target
c80e2d5c10d0594bb61013ad23dbf5c5dd4c26052bf1f550ada4f514618554ac
-
Size
420KB
-
MD5
6967217961022b911ff54c99149ebaa0
-
SHA1
80f6b711d4fa83b9acb5a80247e56b54bafe70c3
-
SHA256
c80e2d5c10d0594bb61013ad23dbf5c5dd4c26052bf1f550ada4f514618554ac
-
SHA512
e9ae53fea572fa08a6ffa4b1d9a25016d57288607085ce881d895fb5135cb34be76b5d5133bfd1e797295308cde2956731c7d3210312088558bf9e16816151c7
-
SSDEEP
6144:FSY4KF8dKAOyC5E3ujNjbWUxgScdyctYrT7/PsW8EZd40seWs9Zxip:Fy9V5uBX4btYLPsfEHlWs9ap
Malware Config
Signatures
Files
-
c80e2d5c10d0594bb61013ad23dbf5c5dd4c26052bf1f550ada4f514618554ac.exe windows x86
659973d21829566e320204aa671c44d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
bwlist
?get_record_count@bwlist@@QBEIXZ
??0bwlist_record@@QAE@_N@Z
?get_field@bwlist_record@@QBEABVbasic_field_type@@I@Z
?locate_record@bwlist@@QAE_NIAAVbwlist_record@@@Z
??1bwlist_record@@QAE@XZ
??1boolean_field_type@@UAE@XZ
??0boolean_field_type@@QAE@ABV0@@Z
??Bboolean_field_type@@QBE_NXZ
?open_instance@bwlist@@QAEIPBD@Z
?refresh_instance@bwlist@@QAEIXZ
?lookup_record@bwlist@@QAE_NAAVlookup_condition1@@@Z
??1bwlist@@UAE@XZ
?close_instance@bwlist@@QAEXXZ
??0bwlist@@QAE@XZ
advapi32
RegOpenKeyExA
SetSecurityDescriptorDacl
RegSetValueExA
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegisterServiceCtrlHandlerA
ChangeServiceConfigA
SetServiceStatus
ControlService
StartServiceA
QueryServiceStatus
DeleteService
RegCloseKey
RegQueryValueExA
RegOpenKeyA
StartServiceCtrlDispatcherA
OpenSCManagerA
OpenServiceA
InitializeSecurityDescriptor
CloseServiceHandle
CreateServiceA
wsock32
inet_ntoa
gethostname
gethostbyname
socket
bind
recv
ioctlsocket
htons
select
connect
ntohs
gethostbyaddr
WSACleanup
WSAStartup
send
inet_addr
accept
WSAGetLastError
listen
closesocket
rpcrt4
RpcMgmtStopServerListening
RpcServerUnregisterIf
RpcServerUseProtseqEpA
RpcServerRegisterIf
RpcMgmtIsServerListening
RpcServerListen
NdrFixedArrayMarshall
NdrFixedArrayUnmarshall
NdrPointerBufferSize
NdrPointerMarshall
NdrPointerFree
NdrSimpleStructUnmarshall
NdrSimpleStructBufferSize
NdrSimpleStructMarshall
NdrServerInitializeNew
NdrConvert
RpcRaiseException
I_RpcGetBuffer
oleaut32
SysAllocString
SysFreeString
VariantClear
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
ReadFile
SetLastError
FindFirstFileA
CreateDirectoryA
SetFilePointer
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
ReleaseMutex
GetACP
GetFullPathNameA
InterlockedIncrement
InterlockedDecrement
RaiseException
VirtualAlloc
VirtualFree
GetEnvironmentVariableA
HeapSize
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetCPInfo
TlsGetValue
TlsAlloc
ExitProcess
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetProcAddress
LoadLibraryA
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateEventA
CloseHandle
HeapAlloc
HeapCreate
HeapDestroy
TerminateThread
WaitForSingleObject
SetEvent
ReadProcessMemory
OpenProcess
GetTickCount
WideCharToMultiByte
HeapFree
WaitForMultipleObjects
ResetEvent
GetShortPathNameA
DeleteFileA
InterlockedExchange
OpenEventA
GetVersion
GetTempPathA
WriteFile
CreateFileA
FreeEnvironmentStringsW
GetEnvironmentStringsW
Sleep
IsBadWritePtr
GetPrivateProfileIntA
CreateProcessA
GetFileAttributesA
GetModuleFileNameA
CreateThread
ResumeThread
CreateMutexA
GetLastError
lstrlenA
GetPrivateProfileStringA
WritePrivateProfileSectionA
OpenMutexA
FindClose
FreeEnvironmentStringsA
lstrcpynA
GetEnvironmentStrings
RemoveDirectoryA
FindNextFileA
IsBadReadPtr
GetVersionExA
CopyFileA
GetLocalTime
GetCurrentProcessId
GetStartupInfoA
GetCommandLineA
GetCurrentProcess
SetProcessWorkingSetSize
lstrcpyA
lstrcmpiA
GetCurrentDirectoryA
GetCurrentThreadId
SetEndOfFile
GetFileSize
VirtualQuery
RtlUnwind
TlsSetValue
ExitThread
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetTimeZoneInformation
GetSystemTime
HeapReAlloc
GetModuleHandleA
user32
IsWindow
FindWindowA
wsprintfA
LoadCursorA
SendMessageA
MessageBoxA
LoadStringA
PeekMessageA
RegisterClassExA
CreateWindowExA
DefWindowProcA
TranslateMessage
PostMessageA
GetMessageA
DispatchMessageA
ole32
CoInitialize
StringFromGUID2
CoCreateInstance
CoUninitialize
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE