Static task
static1
Behavioral task
behavioral1
Sample
f9ad9ce2f7e4c244368dcfc60e14fa1078cf9ad7de86a8c5a5a877cb7df6895a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f9ad9ce2f7e4c244368dcfc60e14fa1078cf9ad7de86a8c5a5a877cb7df6895a.exe
Resource
win10v2004-20230220-en
General
-
Target
f9ad9ce2f7e4c244368dcfc60e14fa1078cf9ad7de86a8c5a5a877cb7df6895a
-
Size
274KB
-
MD5
95a6407fecf242e7f5e7c611f5bdf671
-
SHA1
d3fa81d1370cad7424f95417942fa3fe02a2f276
-
SHA256
f9ad9ce2f7e4c244368dcfc60e14fa1078cf9ad7de86a8c5a5a877cb7df6895a
-
SHA512
477f5da3586020fbd1c1bfc34d34a0b7dd44d441dcff6e8ebc3f25d1f47e295040cc8b389c436f64fe20b614f27348a7b5ab60b61268e081f01fe51792d3a8e5
-
SSDEEP
6144:5qGhk8emhEsaQxF5k2HMM92CYIEmY1iSpig9:5P1EsaSuSMa2t
Malware Config
Signatures
Files
-
f9ad9ce2f7e4c244368dcfc60e14fa1078cf9ad7de86a8c5a5a877cb7df6895a.exe windows x86
be33564334ed0a6fa18605df56c7d88c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord762
ord1084
ord1091
ord3163
ord3204
ord4244
ord3337
ord760
ord784
ord758
ord2234
ord5613
ord567
ord1071
ord6090
ord709
ord5642
ord6037
ord3934
ord501
ord2322
ord5403
ord2468
ord5491
ord2272
ord4081
ord911
ord2368
ord1931
ord1483
ord4098
ord2089
ord1547
ord4234
ord3171
ord591
ord5727
ord304
ord781
ord6067
ord4125
ord297
ord1489
ord299
ord2933
ord6118
ord3641
ord5182
ord4212
ord4890
ord2020
ord1671
ord1670
ord1551
ord5912
ord1401
ord5203
ord4262
ord3182
ord605
ord354
ord1794
ord4735
ord2658
ord2657
ord4353
ord2095
ord1591
ord4240
ord3317
ord741
ord908
ord1482
ord4541
ord3683
ord4038
ord4014
ord6278
ord3801
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord566
ord757
ord2248
ord4749
ord2662
ord4100
ord2094
ord3244
ord1955
ord1283
ord6283
ord6119
ord4320
ord6144
ord3997
ord5419
ord3576
ord3401
ord1191
ord1187
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord310
ord2367
ord3761
ord5731
ord2264
ord265
ord578
ord4115
ord602
ord347
ord1207
ord587
ord764
ord572
ord3164
ord4261
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2991
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4232
ord1402
ord3946
ord1617
ord1620
ord5915
ord1545
ord2086
ord1903
ord2372
ord2902
ord876
ord5637
ord1279
ord1063
ord1280
ord3161
ord1934
ord3210
ord6065
ord4580
ord3684
msvcr71
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
__security_error_handler
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
memset
__CxxFrameHandler
_mbschr
_setmbcp
realloc
?terminate@@YAXXZ
_ismbblead
_controlfp
_mbsicmp
strchr
wcslen
_mbsnbcat
_mbsnbcpy
_mbsrchr
_mbsstr
_mbsinc
atoi
??1exception@@UAE@XZ
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
_CxxThrowException
sscanf
_vsnprintf
_purecall
rand
srand
time
memmove
wcscmp
_strupr
malloc
free
_resetstkoflw
_except_handler3
wcscpy
_mbsupr
kernel32
InterlockedExchange
lstrcmpA
GetPrivateProfileSectionA
lstrcpyA
lstrlenA
GetSystemDirectoryA
lstrcatA
CreateProcessA
CloseHandle
GetPrivateProfileStringA
MultiByteToWideChar
GetLastError
CreateMutexA
Sleep
GetVersion
SetProcessWorkingSetSize
GetACP
GetWindowsDirectoryA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiA
lstrcmpiW
CompareStringA
CompareStringW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetStringTypeExA
GetStringTypeExW
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetProcAddress
LoadLibraryA
FreeLibrary
WideCharToMultiByte
lstrlenW
lstrcpynA
GetModuleFileNameA
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileSectionNamesA
GetLocalTime
WriteFile
SetFilePointer
DeleteFileA
MoveFileA
SetFileAttributesA
GetFileSize
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringA
GetTickCount
GetCurrentProcess
GetModuleHandleA
EnterCriticalSection
LeaveCriticalSection
ReleaseMutex
user32
LoadStringA
UnregisterHotKey
RegisterHotKey
ModifyMenuA
wsprintfA
GetMenuStringA
LoadIconA
GetSystemMetrics
DestroyMenu
TrackPopupMenu
EnableMenuItem
CheckMenuItem
GetSubMenu
LoadMenuA
CreatePopupMenu
AppendMenuA
GetMenuItemCount
AppendMenuW
SetCursor
CopyIcon
ScreenToClient
GetMessagePos
CharLowerA
CharLowerW
CharUpperW
UnregisterClassA
SetForegroundWindow
GetWindowDC
IsWindow
LoadImageA
GetWindow
FrameRect
PtInRect
SetWindowRgn
LoadCursorA
GetSysColorBrush
RegisterClassExA
InflateRect
GetDesktopWindow
KillTimer
SetTimer
GetClientRect
GetWindowRect
DrawTextA
GetCursorPos
DrawTextW
GetNextDlgGroupItem
PostMessageA
ReleaseCapture
GetCapture
ClientToScreen
WindowFromPoint
IsIconic
PostQuitMessage
SetWindowLongA
GetSysColor
DrawIcon
wvsprintfA
SendMessageA
GetParent
CopyRect
OffsetRect
FindWindowA
CharUpperA
SetCapture
GetWindowTextA
SetWindowTextW
ReleaseDC
SetWindowTextA
GetWindowLongA
EnableWindow
InvalidateRect
LoadBitmapA
ModifyMenuW
gdi32
StretchBlt
TextOutW
GetTextExtentPoint32A
CreateBitmap
GetStockObject
CreateRoundRectRgn
CreatePolygonRgn
CombineRgn
FrameRgn
CreateRectRgn
CreateFontA
CreateSolidBrush
DeleteObject
BitBlt
CreateCompatibleDC
GetObjectA
CreateFontIndirectA
advapi32
RegQueryValueA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
comctl32
_TrackMouseEvent
shlwapi
PathRemoveFileSpecA
UrlEscapeA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantClear
SetErrorInfo
LoadRegTypeLi
VariantInit
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.+% Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE