wuhen
Static task
static1
Behavioral task
behavioral1
Sample
c43dd0c5a9bef5fe6d2e72cd862fce07fca27b9d6798fd034468fe93d9050d19.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c43dd0c5a9bef5fe6d2e72cd862fce07fca27b9d6798fd034468fe93d9050d19.exe
Resource
win10v2004-20220812-en
General
-
Target
c43dd0c5a9bef5fe6d2e72cd862fce07fca27b9d6798fd034468fe93d9050d19
-
Size
230KB
-
MD5
f4a0d77ee95a6137bd7e35619f8c7270
-
SHA1
2f243431d1c940c46b5bad3793a7d934b3df7c54
-
SHA256
c43dd0c5a9bef5fe6d2e72cd862fce07fca27b9d6798fd034468fe93d9050d19
-
SHA512
cb3f46e743089a550c1633d43fc01cc2a3af3e1fdd9a3136e4012f08e9eeb806abb9ba6f02c901d9962b729283c22a902e64aff8653de19a96573a926e23577d
-
SSDEEP
6144:KektJ7D6gddVjPZmfzsYpR91Gqz2Cqy+ZJB:K5t16gddVjP0oyPHW1D
Malware Config
Signatures
Files
-
c43dd0c5a9bef5fe6d2e72cd862fce07fca27b9d6798fd034468fe93d9050d19.exe windows x86
6e920f02ffb9418ec6ec4828ffd4834a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
VirtualFree
SetEvent
GetPrivateProfileSectionNamesA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetVersionExA
CreateDirectoryA
GetDriveTypeA
LocalFree
LocalAlloc
RemoveDirectoryA
GetLastError
CreateProcessA
MoveFileA
GetLocalTime
CreateEventA
GlobalFree
GlobalUnlock
ReleaseMutex
SetErrorMode
WaitForSingleObject
OutputDebugStringA
Sleep
lstrlenA
InterlockedExchange
FreeLibrary
GetStartupInfoA
GetModuleHandleA
RaiseException
msvcrt
strncat
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
_errno
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
atoi
strncmp
rename
strrchr
_except_handler3
free
malloc
strchr
strstr
_ftol
__getmainargs
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_CxxThrowException
_strnicmp
msvcp60
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xran@std@@YAXXZ
Exports
Exports
Sections
PAGE Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ