Static task
static1
Behavioral task
behavioral1
Sample
b23753e8cd3a8d98e8024e1100b2b551171d0528225d70a2ccb14d50a1d40f5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b23753e8cd3a8d98e8024e1100b2b551171d0528225d70a2ccb14d50a1d40f5f.exe
Resource
win10v2004-20220812-en
General
-
Target
b23753e8cd3a8d98e8024e1100b2b551171d0528225d70a2ccb14d50a1d40f5f
-
Size
271KB
-
MD5
a59d547311dd7f749705575bb1e6e368
-
SHA1
7a7229b572cad87168541af341924db0ba2b7430
-
SHA256
b23753e8cd3a8d98e8024e1100b2b551171d0528225d70a2ccb14d50a1d40f5f
-
SHA512
2acde93ca280ccef9430c4106c2bdaf50fadf129d310c1554422af93b183b8b4c2d0173aef0b847224378d0ec5175bf498afaa2d101f93b0cb3b5b8ede189c24
-
SSDEEP
1536:rrxzs3O9Pefv91DRCN3N1nXXUviSVQNTutzHjXR:Bs3OtefvPRE91nXE/VQyzDXR
Malware Config
Signatures
Files
-
b23753e8cd3a8d98e8024e1100b2b551171d0528225d70a2ccb14d50a1d40f5f.exe windows x86
e96029fae2370448bcde69ba0a218329
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
CoTaskMemFree
kernel32
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
GlobalFree
lstrcmpA
UnmapViewOfFile
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
TerminateProcess
GlobalAlloc
lstrcmpiA
TerminateThread
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetTickCount
GetTempPathA
GetSystemTime
GetSystemDirectoryA
GetStartupInfoA
GetProcAddress
GetPrivateProfileStringA
SuspendThread
Sleep
SetFilePointer
SetEvent
RtlZeroMemory
GlobalMemoryStatus
RtlMoveMemory
ResumeThread
RemoveDirectoryA
ReadFile
Process32Next
Process32First
PeekNamedPipe
OpenProcess
MultiByteToWideChar
MoveFileA
MapViewOfFile
LocalFree
LocalAlloc
LoadLibraryA
GetPrivateProfileSectionNamesA
GetPrivateProfileIntA
GetModuleHandleA
GetModuleFileNameA
GetLogicalDrives
GetLocaleInfoA
GetLocalTime
GetLastError
GetFileSize
GetFileAttributesA
GetExitCodeProcess
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentThread
GetCurrentProcess
GetCurrentDirectoryA
GetComputerNameA
FreeLibrary
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitThread
ExitProcess
DeleteFileA
CreateToolhelp32Snapshot
CreateThread
CreateProcessA
CreatePipe
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
lstrcatA
user32
WaitForInputIdle
TranslateMessage
SetWindowLongA
SetTimer
wsprintfA
CreateWindowExA
ReleaseDC
MessageBoxA
GetMessageA
GetDC
DispatchMessageA
SendMessageA
advapi32
OpenProcessToken
StartServiceCtrlDispatcherA
StartServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCloseKey
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
GetUserNameA
CreateServiceA
CloseServiceHandle
AdjustTokenPrivileges
shlwapi
StrChrA
StrCmpNA
StrStrIA
StrRChrA
shell32
ShellExecuteA
wsock32
gethostname
gethostbyname
connect
closesocket
bind
accept
__WSAFDIsSet
select
WSAGetLastError
WSACleanup
WSAStartup
send
getsockname
htonl
htons
ioctlsocket
shutdown
socket
inet_addr
inet_ntoa
listen
ntohl
recv
ws2_32
WSAIoctl
rasapi32
RasGetEntryPropertiesA
RasGetEntryDialParamsA
RasEnumEntriesA
gdi32
GetDeviceCaps
urlmon
URLDownloadToFileA
Sections
.text Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE