Static task
static1
Behavioral task
behavioral1
Sample
Shaiya_Hack.exe
Resource
win10v2004-20230220-es
General
-
Target
Shaiya_Hack.exe
-
Size
307KB
-
MD5
73005c69374ebd5b87aa084f604c623c
-
SHA1
c0609d1d586021bb74047db25125313add0479a4
-
SHA256
87c16a7393c5d386c26f9a71528c4e25f1c1ac67e76630ec85d54a544b10009d
-
SHA512
1b70daebce4bf7cd436a4c58ee701eda747f0efa0c3c53ac4d1da5ee7e1b8d37334f5b17df73711cff748ae78739f62bc11915209e36d3a0f5a97a4221b505ff
-
SSDEEP
768:xuQQNoosRAfTSvY6R1S9Y0HZpIYP5Q4ulnYTkqJeKDVGYV/q/VCbq:fRAOvYW8InYpJP9q/VCb
Malware Config
Signatures
Files
-
Shaiya_Hack.exe.exe windows x86
71f4521da3dcef649b0e28fac13b8098
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc140u
ord12131
ord10379
ord7653
ord995
ord1472
ord7997
ord2205
ord952
ord13442
ord7313
ord13911
ord6860
ord10250
ord5763
ord12928
ord12219
ord12251
ord10433
ord8217
ord4589
ord12247
ord12239
ord5918
ord3852
ord6349
ord14668
ord6350
ord14669
ord6348
ord14667
ord8000
ord12531
ord14466
ord11983
ord11982
ord2034
ord7941
ord5411
ord4090
ord4152
ord9398
ord14595
ord7922
ord14589
ord12542
ord12541
ord2486
ord5357
ord8324
ord12865
ord8386
ord8470
ord2215
ord2246
ord4885
ord8464
ord3833
ord890
ord1391
ord11038
ord501
ord1143
ord4093
ord5582
ord8754
ord14137
ord8171
ord458
ord280
ord2990
ord9040
ord2409
ord5252
ord5790
ord5525
ord4092
ord5760
ord5549
ord5249
ord12168
ord3265
ord3371
ord3372
ord3941
ord12124
ord2682
ord5935
ord13703
ord11717
ord6877
ord14596
ord7923
ord14590
ord3055
ord4494
ord9693
ord4502
ord4988
ord4927
ord4912
ord4974
ord5019
ord4942
ord4997
ord5013
ord4954
ord4960
ord4966
ord4948
ord5003
ord4936
ord1777
ord1756
ord1770
ord1744
ord1722
ord12258
ord12262
ord13878
ord3266
ord9256
ord11002
ord6978
ord12220
ord8965
ord14588
ord11936
ord3838
ord12089
ord9132
ord11726
ord11725
ord5652
ord10288
ord10284
ord10286
ord10287
ord10285
ord14785
ord2761
ord8210
ord3302
ord3305
ord13756
ord6220
ord6533
ord11396
ord4225
ord462
ord7109
ord2996
ord1045
ord286
ord266
ord265
ord1511
ord3404
ord3403
ord3164
ord6218
ord13752
ord2760
ord9139
ord12173
ord9235
ord9210
ord11015
ord13656
ord8067
ord8062
ord10472
ord7495
ord3697
ord1113
ord6489
ord6566
ord3882
ord4815
ord2304
ord1111
ord296
ord1180
ord1002
ord6589
ord9209
ord10255
ord8219
ord5409
ord7712
ord7723
ord7722
ord5984
ord9350
ord5228
ord12947
ord1513
kernel32
CloseHandle
OpenProcess
K32GetModuleBaseNameW
K32GetModuleFileNameExW
Process32NextW
FileTimeToDosDateTime
GetPrivateProfileStringW
GetPrivateProfileIntW
WritePrivateProfileStringW
WriteProcessMemory
Process32FirstW
CreateToolhelp32Snapshot
GetProcessTimes
OutputDebugStringW
InitializeCriticalSectionEx
GetLastError
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
CreateEventW
GetProcAddress
GetModuleHandleW
ReadProcessMemory
user32
GetSystemMetrics
GetClientRect
DrawIcon
GetMenuState
LoadIconW
EnableWindow
IsIconic
CheckMenuItem
AppendMenuW
GetSystemMenu
SendMessageW
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
msvcp140
?_Xlength_error@std@@YAXPBD@Z
vcruntime140
memmove
__CxxFrameHandler3
__vcrt_InitializeCriticalSectionEx
_except_handler4_common
memset
_CxxThrowException
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_invalid_parameter_noinfo_noreturn
terminate
_controlfp_s
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
_exit
exit
_initterm_e
_initterm
_get_wide_winmain_command_line
_initialize_wide_environment
_configure_wide_argv
_set_app_type
_seh_filter_exe
api-ms-win-crt-filesystem-l1-1-0
remove
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 270KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ