Static task
static1
Behavioral task
behavioral1
Sample
02633F4E1865CCDC5DE2EB06B915938C.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02633F4E1865CCDC5DE2EB06B915938C.exe
Resource
win10v2004-20230220-en
General
-
Target
02633F4E1865CCDC5DE2EB06B915938C.exe
-
Size
247KB
-
MD5
02633f4e1865ccdc5de2eb06b915938c
-
SHA1
385da60d930adbdbeb1381ed5fbe5f187bf660f8
-
SHA256
797de814e187717aebacefbf50729419c5ddca6a4b6923c52ffbcebeffa60cc3
-
SHA512
691f9608886817409718e54ac9ad55ed3b45bc25e925e0eaf9d91525530805aa0e437bc879bbb73db1e1f938bd90ff86d98b3d0d9a663beea0e79ae52bb5ea49
-
SSDEEP
6144:bKHw7WdMZL1rNJGwhLYGnxP1G58x9tSqQUqhV:e6Wg+2nxP9x/SqQDV
Malware Config
Signatures
Files
-
02633F4E1865CCDC5DE2EB06B915938C.exe.exe windows x64
f01c67d0d10a4796e98d3762e075f6fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
StartServiceCtrlDispatcherA
kernel32
CloseHandle
DeleteCriticalSection
EnterCriticalSection
FreeConsole
GetCurrentProcessId
GetCurrentThreadId
GetFullPathNameA
GetLastError
GetProcAddress
GetStartupInfoA
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
SearchPathA
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_beginthreadex
_cexit
_chsize
_close
_commode
_ctime64
_errno
_fileno
_fmode
_ftime64
_gmtime64
_initterm
_localtime64
_lock
_lseek
_mktime64
_onexit
_open
_read
_stat64
_strerror
_strdup
_stricmp
_strnicmp
_time64
_unlock
abort
atoi
calloc
clock
exit
fclose
fflush
fgets
fopen
fprintf
fputc
free
freopen
fseek
ftell
fwrite
getc
islower
isspace
isupper
isxdigit
_write
localeconv
malloc
memcmp
memcpy
memmove
memset
perror
realloc
rand
remove
rewind
signal
srand
strchr
strcmp
strcpy
strerror
strlen
strncat
strncmp
strrchr
strstr
strtok
strtol
strtoul
system
tolower
toupper
ungetc
vfprintf
wcslen
odbc32
SQLAllocHandle
SQLConnect
SQLDisconnect
SQLExecDirect
SQLFreeHandle
SQLSetConnectAttr
SQLSetEnvAttr
user32
MessageBoxA
ws2_32
WSAGetLastError
WSASocketA
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
gethostbyname
gethostname
getpeername
getsockname
getsockopt
htonl
htons
ioctlsocket
listen
ntohl
ntohs
recv
recvfrom
select
send
sendto
setsockopt
shutdown
socket
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 14KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ