Static task
static1
Behavioral task
behavioral1
Sample
b504ce14d08e36770a5d56148d2890227032760b082458b6583542ce4d81613d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b504ce14d08e36770a5d56148d2890227032760b082458b6583542ce4d81613d.exe
Resource
win10v2004-20220812-en
General
-
Target
b504ce14d08e36770a5d56148d2890227032760b082458b6583542ce4d81613d
-
Size
27KB
-
MD5
d90f60558c4a87db6dd223a5fa0a2870
-
SHA1
3ef1af92c3e4448ae868af42f07c79f621ee818e
-
SHA256
b504ce14d08e36770a5d56148d2890227032760b082458b6583542ce4d81613d
-
SHA512
8eeac385cde3c6ea5f8adb1f2f57d827bd98d326228040b694d5b5af583d3d943595391638c5c05f536ace930b3ca71d9eb21b3799d889ec188b43047189ae87
-
SSDEEP
768:10TooP+tr0ED3QOKMVE/qEkhs45SpXA7:KPSv7bKM8qEmSpXm
Malware Config
Signatures
Files
-
b504ce14d08e36770a5d56148d2890227032760b082458b6583542ce4d81613d.exe windows x86
21e548d42cd689f355f133cc146b1582
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSASocketA
htonl
sendto
inet_addr
WSAGetLastError
WSAAsyncSelect
WSAStartup
getprotobyname
socket
gethostbyname
setsockopt
htons
connect
send
recv
closesocket
WSACleanup
kernel32
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
GetProcAddress
GetModuleHandleA
VirtualProtectEx
VirtualAllocEx
VirtualAlloc
lstrcatA
HeapFree
HeapAlloc
CreateProcessA
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetSystemDirectoryA
GetTickCount
SetPriorityClass
GetCurrentProcess
CloseHandle
CreateMutexA
CreateThread
ExitProcess
GetCommandLineA
GetModuleFileNameA
Sleep
FreeLibrary
LoadLibraryA
DeleteFileA
SetFileAttributesA
GetThreadContext
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
GetCurrentProcessId
GetFileAttributesA
GetCurrentThreadId
WriteFile
CreateFileA
ReadProcessMemory
VirtualQueryEx
GetStartupInfoA
GetProcessHeap
MoveFileA
user32
DefWindowProcA
ExitWindowsEx
PostQuitMessage
RegisterClassA
PostThreadMessageA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
GetInputState
CreateWindowExA
advapi32
GetUserNameA
LookupAccountNameA
RegDeleteKeyA
RegOpenKeyA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
AddAce
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
RegCloseKey
RegCreateKeyA
RegSetValueA
RegSetValueExA
msvcp60
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
netapi32
NetApiBufferFree
NetUserGetLocalGroups
msvcrt
_itoa
ftell
fseek
fclose
fopen
fread
sprintf
rand
strstr
atoi
strncpy
strcspn
__CxxFrameHandler
malloc
_strlwr
_except_handler3
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE