Static task
static1
Behavioral task
behavioral1
Sample
8e4d7c7de1980c4c3134d2fd18e4ad12722b533ddda56933fff672474477340f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e4d7c7de1980c4c3134d2fd18e4ad12722b533ddda56933fff672474477340f.exe
Resource
win10v2004-20221111-en
General
-
Target
8e4d7c7de1980c4c3134d2fd18e4ad12722b533ddda56933fff672474477340f
-
Size
60KB
-
MD5
2783f46103dd05965634051363a22ae2
-
SHA1
9572f11f607f693c333358428f2b60545792100f
-
SHA256
8e4d7c7de1980c4c3134d2fd18e4ad12722b533ddda56933fff672474477340f
-
SHA512
b340efbc65ca0bf7bf503718f0f04f0a55b8b6b5674fcdfbc7cd320ab5b7addbf0e2fa8c7eb9fd3fa96f6ed9dace02b7c72ad94c393a3d92e0be1943dedeccea
-
SSDEEP
768:hrfIrG3IssYkrUUcPaJcd3rKRfzmdYHqXFveTZGThYDzcKSuGXq:FfYlJrvcSJAmRfoYHG2J1Sxq
Malware Config
Signatures
Files
-
8e4d7c7de1980c4c3134d2fd18e4ad12722b533ddda56933fff672474477340f.exe windows x86
71b7724e41cd842210ce67cd26160364
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAStartup
WSASocketA
htons
connect
WSACleanup
inet_addr
gethostname
gethostbyname
inet_ntoa
closesocket
send
recv
shell32
ShellExecuteA
SHGetFileInfoA
netapi32
Netbios
gdi32
GetStockObject
user32
GetWindowTextA
PostQuitMessage
LoadIconA
LoadCursorA
DefWindowProcA
CreateWindowExA
UpdateWindow
GetMessageA
DispatchMessageA
TranslateMessage
wsprintfA
IsCharAlphaNumericA
CharUpperA
RegisterClassA
GetForegroundWindow
advapi32
OpenProcessToken
LookupPrivilegeValueA
RegDeleteValueA
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegEnumKeyExA
RegOpenKeyExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
GetUserNameA
LookupAccountNameA
IsTextUnicode
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
DuplicateToken
SetThreadToken
RegOpenKeyA
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
secur32
AcquireCredentialsHandleW
InitializeSecurityContextW
shlwapi
PathFindFileNameA
crypt32
CryptUnprotectData
msvcrt
rename
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fwrite
strstr
strtok
??1type_info@@UAE@XZ
malloc
wcscpy
??3@YAXPAX@Z
??2@YAPAXI@Z
printf
calloc
fopen
fseek
ftell
fread
fclose
sprintf
free
strncpy
strncmp
_itoa
_chdir
_CxxThrowException
atoi
oleaut32
GetErrorInfo
kernel32
lstrlenW
SetEvent
ResetEvent
CreateThread
lstrcatA
lstrcpyA
GetEnvironmentVariableA
lstrcmpA
TerminateThread
TerminateProcess
CreateProcessA
GetStartupInfoA
CreatePipe
GetDriveTypeA
lstrcpynA
SetFilePointer
GetLogicalDrives
Sleep
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
MoveFileExA
CreateEventA
GetModuleHandleA
LocalFree
GetExitCodeThread
ResumeThread
GetSystemDirectoryA
ReadFile
MultiByteToWideChar
GetModuleFileNameA
SetLastError
WriteFile
lstrlenA
CreateFileA
GetVersion
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
CloseHandle
WideCharToMultiByte
DeleteFileA
CopyFileA
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
GetVersionExA
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE