Static task
static1
Behavioral task
behavioral1
Sample
f5d31c5c72cf3db0a3df79e0fa8777463103233cd0c54a7e4e5b82d871dece6f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5d31c5c72cf3db0a3df79e0fa8777463103233cd0c54a7e4e5b82d871dece6f.exe
Resource
win10v2004-20220812-en
General
-
Target
f5d31c5c72cf3db0a3df79e0fa8777463103233cd0c54a7e4e5b82d871dece6f
-
Size
13KB
-
MD5
434a5d16e2daf22b54ff639c5c5a9014
-
SHA1
c8d777eb8b27af2cabeb3c3d3f994fd2d549493c
-
SHA256
f5d31c5c72cf3db0a3df79e0fa8777463103233cd0c54a7e4e5b82d871dece6f
-
SHA512
2e0a6af786ed83a106322244b48bd49e87910ada671f607a4d0da53a46504dfadeb4a0b6c51168f47f5cf6cfffe811f46d42dc008319044ca03021655de754be
-
SSDEEP
192:2tzYAc8d2M2dww2yvRGQ51iq10spXtNz/Vvo4AbvzJQhbjpBS1mbDAVlDRh:yzYi01RGOQsbNvU2
Malware Config
Signatures
Files
-
f5d31c5c72cf3db0a3df79e0fa8777463103233cd0c54a7e4e5b82d871dece6f.exe windows x86
2e8978f1dab9e0db20038cce5722dec6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
CloseHandle
GetFileSize
WriteFile
CreateFileA
DeleteFileA
FreeLibrary
GetLastError
lstrcatA
WaitForSingleObject
CreateThread
WinExec
CreateMutexA
GetVersionExA
lstrcmpiA
SetFileAttributesA
GetTickCount
ReadFile
SetFilePointer
CopyFileA
LoadLibraryA
GetProcAddress
GetCurrentProcess
Sleep
OutputDebugStringA
user32
ShowWindow
GetWindowLongA
FindWindowA
wsprintfA
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
wininet
DeleteUrlCacheEntry
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
shell32
ShellExecuteA
msvcrt
malloc
_onexit
__dllonexit
_except_handler3
fopen
fwrite
fclose
fread
atoi
__CxxFrameHandler
time
localtime
strlen
memcpy
memset
_itoa
strchr
strcpy
sprintf
strcat
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE