Static task
static1
Behavioral task
behavioral1
Sample
dbc1851c84bcc8403978b1f2812e790c3322f141f6d850d9b36a7d10953e52f5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dbc1851c84bcc8403978b1f2812e790c3322f141f6d850d9b36a7d10953e52f5.exe
Resource
win10v2004-20221111-en
General
-
Target
dbc1851c84bcc8403978b1f2812e790c3322f141f6d850d9b36a7d10953e52f5
-
Size
180KB
-
MD5
89185ff48e952cfc7493ee273a926a71
-
SHA1
1fd1c8c64b2418fc15adfe7c6913d8d840f62d80
-
SHA256
dbc1851c84bcc8403978b1f2812e790c3322f141f6d850d9b36a7d10953e52f5
-
SHA512
25d90d8732c82e783da969c8c37a2db59a605223a7f947a73d5c4d7bd4f0fa301b1025257526fe7a8c9ff53345ef43d5cff7da49a4ae872186f9b12772f43bd1
-
SSDEEP
3072:C6ehvUxqyQE06EHrtCFvw5btO9l2fKtTBfNN7bQvV:3ehuqjbx6vw9t6l2fKtTBvvQvV
Malware Config
Signatures
Files
-
dbc1851c84bcc8403978b1f2812e790c3322f141f6d850d9b36a7d10953e52f5.exe windows x86
6d425fa22ca4262557b1ad0ced7b0665
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
CreateEventA
TerminateThread
WaitForSingleObject
GetModuleFileNameA
CreateThread
ResetEvent
Process32First
SetFilePointer
GetShortPathNameA
TerminateProcess
OpenProcess
CreateDirectoryA
GetFileSize
Process32Next
FindFirstFileA
FindClose
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
ReadFile
DeleteFileA
SetEvent
OpenEventA
CreateFileA
WriteFile
CloseHandle
WaitForMultipleObjects
GetStartupInfoA
GetModuleHandleA
GlobalAlloc
GlobalFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
HeapLock
HeapWalk
HeapUnlock
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
GetExitCodeProcess
CreatePipe
GetCurrentProcess
DuplicateHandle
CreateProcessA
GetDriveTypeA
GetVolumeInformationA
FindNextFileA
GetCurrentProcessId
GetLongPathNameA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetExitCodeThread
Sleep
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
shell32
SHFileOperationA
ShellExecuteA
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipDisposeImage
GdipSaveImageToFile
GdipLoadImageFromFile
GdipFree
GdipAlloc
mfc42
ord3626
ord640
ord665
ord1979
ord5186
ord354
ord5785
ord1641
ord1640
ord323
ord800
ord1601
ord537
ord3571
ord3663
ord2414
msvcrt
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
strrchr
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_XcptFilter
_controlfp
_adjust_fdiv
_exit
??1type_info@@UAE@XZ
_CxxThrowException
memset
strcpy
strstr
strcmp
__CxxFrameHandler
sprintf
strlen
_strset
_strupr
wcscmp
free
pow
malloc
_purecall
_ftol
rand
srand
memcmp
strchr
_onexit
memcpy
psapi
EnumProcessModules
GetModuleFileNameExA
user32
IsWindow
PostThreadMessageA
GetMessageA
GetWindowTextA
GetWindowLongA
GetWindowThreadProcessId
GetWindow
GetDesktopWindow
PostMessageA
FindWindowA
GetSystemMetrics
DestroyWindow
SendMessageA
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetObjectA
CreateDCA
GetDIBits
ole32
CoInitialize
CoCreateGuid
CoUninitialize
StringFromGUID2
ws2_32
connect
listen
accept
getpeername
shutdown
getsockname
recvfrom
recv
send
WSACleanup
WSAStartup
gethostbyname
gethostname
closesocket
WSAIoctl
socket
inet_addr
bind
htons
sendto
ntohs
WSAGetLastError
winmm
timeSetEvent
timeKillEvent
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
Sections
.text Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ