Static task
static1
Behavioral task
behavioral1
Sample
580e72337ae373f08974f91ac2bf0351089531acd81c28e77238936fcb49b290.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
580e72337ae373f08974f91ac2bf0351089531acd81c28e77238936fcb49b290.exe
Resource
win10v2004-20221111-en
General
-
Target
580e72337ae373f08974f91ac2bf0351089531acd81c28e77238936fcb49b290
-
Size
104KB
-
MD5
093914c1c94ce7b1542baf66c8f3cdc0
-
SHA1
09829e2683d96611711e24ae2bb460d140db02bf
-
SHA256
580e72337ae373f08974f91ac2bf0351089531acd81c28e77238936fcb49b290
-
SHA512
22271071ea6b501459ed0fda458bf17087d04e7383281dcf35d8f6a15be854b91a1fca3b6704b90ebd3d372d8a622690fc2fa19567c665833e37d38b7e6a99cd
-
SSDEEP
1536:jC1GS/C+y6kGgr/8CADI0R6jowtLU8FeMcYNIJfRw0UneCYHjIU:jCH66kGgr/Xe6jt/eMvNIJRw0sjYH8U
Malware Config
Signatures
Files
-
580e72337ae373f08974f91ac2bf0351089531acd81c28e77238936fcb49b290.exe windows x86
95f1e992064787dc8935a3bc22c72f1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
clock
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
free
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
calloc
_beginthreadex
strchr
strncat
exit
printf
time
srand
rand
atoi
strrchr
_except_handler3
malloc
kernel32
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetLogicalDriveStringsA
FindClose
LocalAlloc
DeleteFileA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetCurrentProcess
OpenProcess
CreateThread
GetTickCount
TerminateThread
WinExec
OutputDebugStringA
GetModuleFileNameA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
SetFileAttributesA
Sleep
CreateMutexA
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetModuleHandleA
GetStartupInfoA
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
CloseHandle
LoadLibraryA
GetProcAddress
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
RemoveDirectoryA
CopyFileA
user32
IsWindowVisible
CharNextA
wsprintfA
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowTextA
OpenWindowStationA
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
SetProcessWindowStation
GetCursorPos
GetCursorInfo
ReleaseDC
gdi32
BitBlt
SelectObject
CreateCompatibleBitmap
GetDIBits
CreateCompatibleDC
DeleteObject
CreateDIBSection
DeleteDC
advapi32
CloseEventLog
CloseServiceHandle
CreateServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
DeleteService
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
OpenSCManagerA
OpenServiceA
ControlService
RegOpenKeyExA
RegQueryValueA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ws2_32
getsockname
gethostname
WSAGetLastError
inet_ntoa
WSACleanup
WSAStartup
htonl
sendto
inet_addr
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
connect
setsockopt
msvcp60
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
mfc42
ord2764
ord4129
ord926
ord924
ord922
ord535
ord858
ord6663
ord537
ord860
ord4278
ord2818
ord939
ord6877
ord800
ord540
ord6648
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ