Static task
static1
Behavioral task
behavioral1
Sample
961ac9140d755715ebddb199d470ca11b2763d52558bdbe82b65ae8b736dd1e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
961ac9140d755715ebddb199d470ca11b2763d52558bdbe82b65ae8b736dd1e1.exe
Resource
win10v2004-20220812-en
General
-
Target
961ac9140d755715ebddb199d470ca11b2763d52558bdbe82b65ae8b736dd1e1
-
Size
64KB
-
MD5
893fbcf8c6b48ceb347c1641de2c97be
-
SHA1
8f2254fcbbcb9fdcaf54627f004641b80618454c
-
SHA256
961ac9140d755715ebddb199d470ca11b2763d52558bdbe82b65ae8b736dd1e1
-
SHA512
d991f80f81c3bb4e122fafa74d8d9b0a504ebb8b8a44dcfda3954b70d5d404b15f36fa518c804ed41179f808c063541c1487c0c59e3b21cd9e066976d2a6d90c
-
SSDEEP
1536:am8nqJ99aYT1WPgBwa6TQmxXAJl7LNKsiO0MEh:fJ7o4iamAL1IO0fh
Malware Config
Signatures
Files
-
961ac9140d755715ebddb199d470ca11b2763d52558bdbe82b65ae8b736dd1e1.exe windows x86
74e5014eccc20c96c63843b99b843c7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
mfc80u
ord2011
ord6272
ord605
ord4008
ord4032
ord3635
ord2897
ord929
ord1430
ord925
ord577
ord920
ord5229
ord384
ord5231
ord4574
ord5956
ord1591
ord4276
ord293
ord4716
ord3397
ord501
ord709
ord5199
ord776
ord4179
ord6271
ord265
ord5067
ord1899
ord5148
ord4238
ord1392
ord3940
ord762
ord1608
ord1611
ord5908
ord3176
ord6720
ord4256
ord4480
ord1542
ord6700
ord2856
ord1661
ord5196
ord1662
ord1590
ord4884
ord1646
ord4729
ord4743
ord1647
ord4206
ord1955
ord5178
ord282
ord5171
ord1353
ord2009
ord4961
ord1479
ord4101
ord4098
ord3339
ord6275
ord3796
ord2260
ord287
ord6273
ord1513
ord386
ord2163
ord1472
ord631
ord2169
ord2271
ord2399
ord2279
ord2381
ord5705
ord2379
ord3795
ord354
ord2397
ord3925
ord2409
ord1236
ord2742
ord2386
ord1058
ord2402
ord2407
ord860
ord5416
ord2390
ord5480
ord2392
ord1431
ord2394
ord1079
ord2388
ord2745
ord2404
ord2384
ord383
ord931
ord283
ord629
ord927
ord266
ord5579
ord899
ord3800
ord1007
ord5096
ord6215
ord5378
ord3826
ord1198
ord1911
ord2925
ord757
ord5220
ord566
ord5222
ord2239
ord3942
ord4562
ord5226
ord3677
ord5209
ord4535
ord5562
ord2531
ord2725
ord2829
ord4301
ord2708
ord2832
ord2534
ord2640
ord2527
ord3712
ord3713
ord3703
ord2638
ord3943
ord4475
ord4255
ord3327
ord764
ord6274
ord5971
ord4320
ord3824
ord280
ord2054
ord774
msvcr80
exit
srand
_time64
rand
_invalid_parameter_noinfo
_wgetenv_s
free
malloc
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
ldiv
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
__CxxFrameHandler3
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
kernel32
GetCurrentProcessId
Sleep
TerminateProcess
GetTickCount
RemoveDirectoryW
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
CopyFileW
CloseHandle
DeleteFileW
CreateFileW
user32
LoadIconW
DrawIcon
GetClientRect
GetSystemMetrics
SendMessageW
EnableWindow
IsIconic
shell32
ShellExecuteW
comctl32
InitCommonControlsEx
msvcp80
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
?append@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@ABV12@@Z
?append@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@PB_W@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ