Static task
static1
Behavioral task
behavioral1
Sample
7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe
Resource
win10v2004-20220812-en
General
-
Target
7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
-
Size
312KB
-
MD5
29726fc9034dcb792b66752170fa49a3
-
SHA1
f164c91db8ca909f6f6e0e9c706b288dece944d6
-
SHA256
7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
-
SHA512
158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
SSDEEP
6144:8NSKQMLdz5NpPrL88qwKUDkhu6b/jtevbST:+LrNqwKUIhEb
Malware Config
Signatures
Files
-
7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe windows x86
cbaa80fc0c68325849b08f50fadb9ed7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__CxxFrameHandler
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
fgets
longjmp
_setjmp3
_ftime
_endthreadex
_beginthreadex
printf
sprintf
_errno
strerror
perror
_initterm
_isctype
_pctype
calloc
fprintf
_iob
fflush
sscanf
strrchr
fwrite
fseek
_stricmp
ftell
fread
fputc
wcscat
fopen
fclose
_ftol
rand
srand
free
malloc
strncat
exit
strncmp
_snprintf
atof
strchr
_vsnprintf
_CxxThrowException
??0exception@@QAE@ABV0@@Z
??2@YAPAXI@Z
strtok
strstr
strncpy
??3@YAXPAX@Z
system
atoi
_purecall
_memccpy
__mb_cur_max
_strdup
_strlwr
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0out_of_range@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
iphlpapi
GetTcpTable
kernel32
TerminateProcess
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetExitCodeThread
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
SetThreadPriority
GetProcessAffinityMask
TlsSetValue
FreeLibrary
WaitForMultipleObjects
CreateEventA
GetCurrentThreadId
DuplicateHandle
InterlockedIncrement
GetThreadPriority
SuspendThread
GetThreadContext
SetThreadContext
ResumeThread
SetEvent
WaitForSingleObject
ResetEvent
InterlockedDecrement
TerminateThread
DeleteCriticalSection
InitializeCriticalSection
CreateThread
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
GetCurrentProcess
OpenProcess
FindResourceA
LoadResource
SizeofResource
LockResource
MultiByteToWideChar
GetLocalTime
GetLastError
GetTempPathA
WriteFile
LoadLibraryA
GetProcAddress
GetTickCount
DeleteFileA
GetSystemDirectoryA
CreateProcessA
ExpandEnvironmentStringsA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
GetStdHandle
AllocConsole
FreeConsole
Sleep
ExitThread
CloseHandle
ReadFile
SetFilePointer
GetFileSize
CreateFileA
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
GetModuleHandleA
SetFileTime
GetFileTime
GetWindowsDirectoryA
CopyFileA
user32
ExitWindowsEx
wsprintfA
advapi32
OpenServiceA
RegQueryInfoKeyA
RegEnumKeyExA
EnumServicesStatusA
OpenThreadToken
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegQueryValueExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
RegCloseKey
ControlService
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
RegCreateKeyExA
GetUserNameA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
shell32
ShellExecuteA
ws2_32
ntohs
getsockname
bind
htons
socket
connect
WSACleanup
WSAStartup
gethostname
WSAGetLastError
__WSAFDIsSet
listen
ioctlsocket
ntohl
recvfrom
sendto
setsockopt
WSASocketA
WSAIoctl
getservbyname
shutdown
WSASetLastError
inet_ntoa
htonl
select
accept
closesocket
send
recv
inet_addr
gethostbyaddr
getpeername
gethostbyname
mpr
WNetAddConnection2W
WNetCancelConnection2W
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
dnsapi
DnsQuery_A
Sections
.text Size: 244KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 478KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ