Static task
static1
Behavioral task
behavioral1
Sample
c8e2acb7472df583a4d87e377c339b9785c9ee56c548e9589957509935d92152.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8e2acb7472df583a4d87e377c339b9785c9ee56c548e9589957509935d92152.exe
Resource
win10v2004-20221111-en
General
-
Target
c8e2acb7472df583a4d87e377c339b9785c9ee56c548e9589957509935d92152
-
Size
21KB
-
MD5
25fbf9022ffe5ee13f1c25eec0037e5c
-
SHA1
196b73671991c8513ca63ef6b5c56dc6c3e9f958
-
SHA256
c8e2acb7472df583a4d87e377c339b9785c9ee56c548e9589957509935d92152
-
SHA512
8bad67662c57d6580e8054752324213a22d1e197aae1058113eea386b96fbf49c587cedb30c8cdda420921ea289d87c880700b5bf2687d9b0f39b9ecc08e48c0
-
SSDEEP
384:khdnNVbua51Edg8+UAq4OwSRNFdv7QuhQ0KTM/0V654Bngv/A8VgAx4y5ZOQoW+4:krnNVbua5Eg8+UAq4OwSRNFdv7QuhQ0/
Malware Config
Signatures
Files
-
c8e2acb7472df583a4d87e377c339b9785c9ee56c548e9589957509935d92152.exe windows x86
0468237b789a05eac4fc4ca097401a9b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
strcpy
exit
toupper
_ftol
strlen
ceil
fopen
fprintf
fclose
_endthread
strcmp
strncpy
_beginthread
atoi
??1type_info@@UAE@XZ
_CxxThrowException
strstr
srand
rand
_snprintf
memset
_vsnprintf
strncat
kernel32
LocalFree
GetSystemTime
CreateFileA
GetFileSize
WriteFile
SetFilePointer
ReadFile
FreeLibrary
LoadLibraryA
GetProcAddress
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
CloseHandle
WinExec
GetComputerNameA
GetLocaleInfoA
GetTickCount
Sleep
TerminateThread
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetCurrentProcessId
ExitProcess
GetLastError
SetFileAttributesA
CopyFileA
GetSystemDirectoryA
GetModuleFileNameA
GetModuleHandleA
SetErrorMode
GetTempPathA
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersionExA
GetFileAttributesA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
MoveFileExA
GetEnvironmentVariableA
GetShortPathNameA
lstrlenA
GlobalUnlock
GlobalLock
GlobalAlloc
DeleteFileA
user32
OpenClipboard
VkKeyScanA
FindWindowA
SetFocus
SetForegroundWindow
keybd_event
CloseClipboard
SetClipboardData
ShowWindow
EmptyClipboard
GetWindowThreadProcessId
BlockInput
ws2_32
send
closesocket
connect
htons
inet_addr
gethostbyname
WSAStartup
socket
recv
WSACleanup
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
urlmon
URLDownloadToFileA
shell32
SHChangeNotify
ShellExecuteA
ShellExecuteExA
advapi32
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
ntdll
ZwSystemDebugControl
NtQuerySystemInformation
oleaut32
VariantInit
SysAllocString
VariantClear
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE