Static task
static1
Behavioral task
behavioral1
Sample
1bed7b500659e1505ce2c6edbad3fb91bd17fd0dd56222f83026d24bd4d2ae0f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1bed7b500659e1505ce2c6edbad3fb91bd17fd0dd56222f83026d24bd4d2ae0f.exe
Resource
win10v2004-20220812-en
General
-
Target
1bed7b500659e1505ce2c6edbad3fb91bd17fd0dd56222f83026d24bd4d2ae0f
-
Size
42KB
-
MD5
c3067519cf4394be6e292a8be05c1132
-
SHA1
307a9d5dac41b3addea6d8e459e849cd6f1b7ed0
-
SHA256
1bed7b500659e1505ce2c6edbad3fb91bd17fd0dd56222f83026d24bd4d2ae0f
-
SHA512
b2efd9f506f7e06e37a66de50e7944f709839dfcc6319626bec64d07fb4c01c98c6478e35cffaca384f3ddf06c97439e03f891b547beabf193b65f0ee22cf01a
-
SSDEEP
768:9vdJOlEej4cNvJ4/acva8ibGxnfGGfcGffJdJONd2dKdXdGdGd:9HZejJ34/acAGhuGkGV
Malware Config
Signatures
Files
-
1bed7b500659e1505ce2c6edbad3fb91bd17fd0dd56222f83026d24bd4d2ae0f.exe windows x86
1a6aec28784d2c343ecbe9b373181500
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
SetErrorMode
GetCommandLineA
CreateMutexA
GetLastError
GetTickCount
CreateThread
HeapFree
ExitProcess
HeapAlloc
WriteFile
CloseHandle
CreateFileA
lstrlenA
SetFileTime
SetFilePointer
CopyFileA
Sleep
FreeLibrary
DeleteFileA
MoveFileExA
GetFileTime
LoadLibraryA
GetProcAddress
FindFirstFileA
FindNextFileA
FindClose
lstrcatA
GetComputerNameA
GetWindowsDirectoryA
lstrcpyA
ReadFile
GetModuleFileNameA
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
shell32
ShellExecuteA
ws2_32
send
connect
closesocket
bind
inet_ntoa
htonl
WSAStartup
htons
socket
recv
user32
wsprintfA
shlwapi
SHSetValueA
SHQueryValueExA
advapi32
OpenServiceA
OpenSCManagerA
ChangeServiceConfigA
CloseServiceHandle
ControlService
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE