Static task
static1
Behavioral task
behavioral1
Sample
90419c3ec4cacf3b7fca3472c53cbc16d30180382b5709291e6f96320eeb99cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90419c3ec4cacf3b7fca3472c53cbc16d30180382b5709291e6f96320eeb99cf.exe
Resource
win10v2004-20221111-en
General
-
Target
90419c3ec4cacf3b7fca3472c53cbc16d30180382b5709291e6f96320eeb99cf
-
Size
280KB
-
MD5
691983ff59dd5cb2adfd92ae72399870
-
SHA1
e7aa3264ebb0fae784d8da218a74e2dea0aa26cf
-
SHA256
90419c3ec4cacf3b7fca3472c53cbc16d30180382b5709291e6f96320eeb99cf
-
SHA512
87404597291dc05e8a815f1676cddf716c6bc2c377ba4c5d8b0bf00a4e609ff79c14240f3763c550b38db21849585bf34c0ff34b39a86d2ec332628a84e324b9
-
SSDEEP
6144:q3EPrvIAzejNyxjNaB1WlVGf5U7sGuG/Fqwy+LkNpLw+ecUG+Egt2gPD:sboNaBeGf57GuolkXcR5jt2gP
Malware Config
Signatures
Files
-
90419c3ec4cacf3b7fca3472c53cbc16d30180382b5709291e6f96320eeb99cf.exe windows x86
46b79c7e2403454f752bc68d9ffe0fc6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord1271
ord518
ord785
ord858
ord4129
ord5683
ord535
ord540
ord4277
ord1200
ord2818
ord665
ord941
ord354
ord5651
ord3127
ord3616
ord1979
ord6385
ord5186
ord860
ord350
ord5583
ord3337
ord939
ord926
ord3811
ord6877
ord922
ord3318
ord6302
ord2915
ord348
ord6283
ord2919
ord2764
ord6282
ord5710
ord2614
ord2784
ord4202
ord940
ord2393
ord6663
ord6648
ord5829
ord3726
ord801
ord551
ord541
ord2763
ord4204
ord2068
ord6883
ord6153
ord3790
ord5861
ord1871
ord321
ord663
ord389
ord5207
ord5356
ord1988
ord5354
ord6869
ord548
ord690
ord1176
ord6215
ord4710
ord4234
ord324
ord1168
ord1146
ord3597
ord4425
ord4627
ord5277
ord2124
ord2446
ord5261
ord5812
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord4998
ord4853
ord4376
ord5265
ord1247
ord1199
ord1134
ord4168
ord2621
ord2514
ord641
ord815
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord1243
ord6467
ord1578
ord600
ord826
ord269
ord1576
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord711
ord924
ord413
ord4673
ord6394
ord6383
ord5440
ord5450
ord2107
ord2841
ord825
ord823
ord3663
ord800
ord537
ord287
ord610
ord3575
ord4278
msvcrt
__CxxFrameHandler
_ftol
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
??1type_info@@UAE@XZ
_setmbcp
_strnicmp
_stricmp
_itoa
memset
strcmp
_strupr
strlen
strcpy
printf
_ismbcspace
_vsnprintf
_access
memmove
strtok
_mbsicmp
atof
strncmp
strstr
atoi
sprintf
sscanf
_CxxThrowException
time
strncpy
_mkdir
_mbscmp
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
srand
rand
memchr
tolower
strchr
isspace
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
fclose
fgets
fopen
_snprintf
_purecall
fread
ftell
fseek
fputs
fprintf
isalpha
isalnum
kernel32
SetCommState
SetCommTimeouts
ReadFile
CreateToolhelp32Snapshot
GetCommState
CreateFileA
WriteFile
LocalAlloc
MultiByteToWideChar
lstrlenA
LocalFree
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
InterlockedDecrement
GetTickCount
GetCurrentProcess
GetLocalTime
GetCurrentThreadId
OpenProcess
UnmapViewOfFile
SetEvent
ResetEvent
CreateFileMappingA
MapViewOfFile
GetModuleFileNameA
GetCurrentProcessId
HeapFree
GetProcessHeap
HeapAlloc
GetLastError
TerminateProcess
WinExec
GetTempPathA
Thread32First
Thread32Next
InterlockedExchange
InterlockedIncrement
WideCharToMultiByte
GetStartupInfoA
GetModuleHandleA
WaitForSingleObject
CreateThread
CloseHandle
Sleep
user32
SendMessageA
EnableWindow
GetDesktopWindow
LoadIconA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
OleRun
advapi32
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
InitializeSecurityDescriptor
RegCloseKey
GetAclInformation
GetLengthSid
IsValidSid
FreeSid
AllocateAndInitializeSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
shell32
ShellExecuteA
oleaut32
SysAllocString
VariantClear
SysFreeString
GetErrorInfo
wsock32
setsockopt
getsockopt
ioctlsocket
gethostbyname
socket
connect
closesocket
recv
send
WSAGetLastError
inet_ntoa
shutdown
htons
select
gethostname
msvcp60
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?_Xlen@std@@YAXXZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@D@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 188KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ