Static task
static1
Behavioral task
behavioral1
Sample
d5db2f95fbe5615a8d5ad2c565183d8c6501c1b1c6b9b0035d4cfb097028d283.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5db2f95fbe5615a8d5ad2c565183d8c6501c1b1c6b9b0035d4cfb097028d283.exe
Resource
win10v2004-20220812-en
General
-
Target
d5db2f95fbe5615a8d5ad2c565183d8c6501c1b1c6b9b0035d4cfb097028d283
-
Size
1.4MB
-
MD5
8678b788f7b16127ef930af94a89fa71
-
SHA1
2fc5f1ac38679c5bf41f9bc98025ecaad6ef9730
-
SHA256
d5db2f95fbe5615a8d5ad2c565183d8c6501c1b1c6b9b0035d4cfb097028d283
-
SHA512
20fcd4c1149fa289b531ab56006f9dc91eb764117395ac4af8cdb344ec48815f24a836ee7427e172394243761f61335489e2b5768f6c625bf82b581f0a131e13
-
SSDEEP
24576:u3z7cckx76+EKPQWsXKxYjMSKk2l0p2s2V77rNMbDZ8W5CgSlFN2fwVytKR:izYe+EmwU22lIUV77BGDeW5hWtytKR
Malware Config
Signatures
Files
-
d5db2f95fbe5615a8d5ad2c565183d8c6501c1b1c6b9b0035d4cfb097028d283.exe windows x86
1dbd07ae91ba38160e4b8b68681880e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord1402
ord781
ord4125
ord1903
ord2164
ord6065
ord3684
ord3430
ord2346
ord3210
ord1934
ord3161
ord1280
ord1279
ord5637
ord2902
ord1931
ord1483
ord4098
ord2089
ord1547
ord5915
ord4234
ord5214
ord2991
ord4261
ord3171
ord572
ord591
ord304
ord5731
ord2263
ord2367
ord709
ord602
ord5613
ord1929
ord5888
ord347
ord501
ord5807
ord2469
ord3255
ord1580
ord5331
ord6297
ord5320
ord6286
ord762
ord297
ord907
ord3454
ord1554
ord620
ord2372
ord3934
ord6090
ord4353
ord2131
ord784
ord2468
ord4104
ord6167
ord3761
ord6236
ord1084
ord3287
ord3204
ord2371
ord1283
ord1063
ord265
ord266
ord1614
ord760
ord5563
ord3997
ord4394
ord4648
ord300
ord4035
ord5403
ord2475
ord2272
ord2654
ord3989
ord4320
ord6144
ord5833
ord1489
ord299
ord2933
ord6118
ord1482
ord4749
ord1966
ord4001
ord4123
ord5641
ord911
ord1486
ord1024
ord1263
ord2662
ord1728
ord5642
ord6037
ord2451
ord1395
ord1091
ord4100
ord2094
ord3244
ord1955
ord2075
ord326
ord1565
ord2869
ord416
ord651
ord1930
ord2477
ord2938
ord4888
ord3635
ord3595
ord1920
ord2931
ord5224
ord5227
ord3948
ord4569
ord5230
ord5213
ord5567
ord2838
ord4481
ord759
ord570
ord2249
ord4541
ord3683
ord4085
ord629
ord1439
ord6288
ord5089
ord384
ord751
ord1025
ord586
ord1054
ord1544
ord322
ord1123
ord3830
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord5226
ord2248
ord4568
ord5566
ord3333
ord757
ord566
ord1198
ord1185
ord5715
ord4041
ord3182
ord562
ord785
ord5323
ord5142
ord1917
ord5570
ord3401
ord1631
ord1096
ord313
ord1199
ord5185
ord557
ord745
ord1191
ord1187
ord908
ord5154
ord3760
ord630
ord3088
ord2021
ord385
ord3596
ord748
ord2098
ord1650
ord1594
ord4243
ord2983
ord3324
ord4115
ord3163
ord2368
ord1545
ord4232
ord3164
ord587
ord5640
ord912
ord1207
ord764
ord4580
ord310
ord2322
ord876
ord2657
ord6067
ord578
ord1794
ord354
ord605
ord4262
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord3441
ord3641
msvcr71
??1exception@@UAE@XZ
srand
rand
sprintf
malloc
_itoa
_strupr
_strnicmp
_setmbcp
free
strncpy
_CxxThrowException
??0exception@@QAE@ABV0@@Z
__CxxFrameHandler
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_ismbblead
_XcptFilter
_exit
_c_exit
?terminate@@YAXXZ
_onexit
__dllonexit
__security_error_handler
??1type_info@@UAE@XZ
memset
calloc
fseek
ftell
_strdup
_except_handler3
_mbctype
fwrite
__p___argv
strncmp
fopen
fread
fclose
strrchr
strstr
strchr
_splitpath
memmove
strftime
ceil
_localtime64
_controlfp
time
_mbsrchr
_time64
atoi
??0exception@@QAE@XZ
kernel32
GlobalLock
GlobalUnlock
GlobalFree
LoadLibraryA
GetProcAddress
FreeLibrary
MulDiv
WaitForMultipleObjects
WinExec
OpenProcess
TerminateProcess
GetLastError
ExitProcess
CreateEventA
ResumeThread
GetPrivateProfileIntA
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileStringA
lstrlenA
WaitForSingleObject
CreateThread
GetTickCount
Sleep
OutputDebugStringA
MultiByteToWideChar
GlobalAlloc
GetLocalTime
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CloseHandle
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
lstrcpyA
CreateDirectoryA
GetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
lstrcatA
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
WideCharToMultiByte
InterlockedIncrement
FreeResource
WriteFile
SetFilePointer
LockResource
LoadResource
SizeofResource
FindResourceA
GetModuleHandleA
DeleteFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateThread
CreateMutexA
InitializeCriticalSection
GlobalHandle
ReadFile
GetFileSize
DeleteCriticalSection
GetModuleFileNameA
user32
GetCursorPos
EnableWindow
GetClientRect
SetTimer
KillTimer
SystemParametersInfoA
GetSystemMetrics
SendMessageA
LoadIconA
DrawEdge
GetWindowRect
InvalidateRect
SetCapture
SetLayeredWindowAttributes
SetWindowLongA
GetWindowLongA
ReleaseCapture
GetSubMenu
LoadMenuA
PostMessageA
IsWindowVisible
DrawFocusRect
GetWindowTextA
DrawStateA
GetClassNameA
GetFocus
RegisterWindowMessageA
IsWindowEnabled
GetActiveWindow
SetActiveWindow
IsIconic
RemoveMenu
InsertMenuA
EnableMenuItem
DrawIcon
wsprintfA
FlashWindow
GetWindowThreadProcessId
BringWindowToTop
GetSysColor
ModifyMenuA
GetMenuItemID
GetMenuItemCount
FillRect
SetForegroundWindow
CopyRect
SetCursor
LoadCursorA
ScreenToClient
DrawTextA
LoadBitmapA
GetForegroundWindow
SetWindowTextA
CallWindowProcA
PostQuitMessage
PeekMessageA
InflateRect
GetDlgItem
SetWindowPos
GetDC
ReleaseDC
FindWindowA
ShowWindow
EnumWindows
UnhookWindowsHookEx
SetWindowsHookExA
SetCursorPos
ClipCursor
GetDesktopWindow
GetAsyncKeyState
gdi32
GetDIBits
CreateDCA
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
CreateSolidBrush
DeleteObject
GetStockObject
GetDeviceCaps
CreateFontA
CreatePen
SetPixel
StretchBlt
PatBlt
CreateBitmap
BitBlt
GetMapMode
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
advapi32
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExA
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteA
Shell_NotifyIconA
comctl32
ord17
ImageList_Draw
_TrackMouseEvent
shlwapi
StrStrIA
StrRStrIA
SHDeleteKeyA
PathRemoveFileSpecA
PathFileExistsA
ole32
CoCreateInstance
CoUninitialize
CreateStreamOnHGlobal
CoInitialize
oleaut32
VarUdateFromDate
VarBstrFromDate
OleLoadPicture
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
ws2_32
inet_ntoa
recv
WSACleanup
listen
accept
bind
connect
send
select
gethostname
ntohl
htonl
closesocket
WSACloseEvent
shutdown
WSAEventSelect
WSACreateEvent
WSAStartup
inet_addr
htons
WSAGetLastError
socket
gethostbyname
msvcp71
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
dbghelp
MiniDumpWriteDump
libeay32
ord3171
ord3106
ord3024
psapi
GetProcessImageFileNameA
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
netapi32
Netbios
gdiplus
GdiplusStartup
GdiplusShutdown
GdipDeleteBrush
GdipCreateSolidFill
GdipFillRectangleI
GdipAlloc
GdipCreateFromHDC
GdipFree
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipLoadImageFromFile
GdipDeleteGraphics
GdipDrawImageRectRect
GdipLoadImageFromStream
GdipCloneImage
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 216KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ