Static task
static1
Behavioral task
behavioral1
Sample
bdcf4c42cc2bd8101cd55d6e227e49e44c3289874927def9c2d3c62a73ea059f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bdcf4c42cc2bd8101cd55d6e227e49e44c3289874927def9c2d3c62a73ea059f.exe
Resource
win10v2004-20220901-en
General
-
Target
bdcf4c42cc2bd8101cd55d6e227e49e44c3289874927def9c2d3c62a73ea059f
-
Size
324KB
-
MD5
ee35d98dc2f8ddc3a78114988b3e09d2
-
SHA1
aa7c6d3095aaab60caeccf3082f1a66b954b8cae
-
SHA256
bdcf4c42cc2bd8101cd55d6e227e49e44c3289874927def9c2d3c62a73ea059f
-
SHA512
ed6f853b9ceda87c17bc67c28316e1573c98c212dfb27970bbf6366d038f9f9c9a974693697b95740bbb8715c1623641330547e0144443808fb2924d3057fd34
-
SSDEEP
6144:MJ6kEenGOtssKgpzZc7XuzDUrN1ANui3sPP1EVDEudBweH4R3zkRJ/2H86GD:u6eGCxpMXQIrN1ANL0ZudBweMwJ/2cn
Malware Config
Signatures
Files
-
bdcf4c42cc2bd8101cd55d6e227e49e44c3289874927def9c2d3c62a73ea059f.exe windows x86
8b0a4edbd463f0729d36857ef3201490
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetModuleFileNameA
Sleep
FindNextFileA
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
WideCharToMultiByte
FindClose
ReleaseMutex
InterlockedExchange
ReadFile
SetFilePointer
GetCurrentProcessId
WriteConsoleA
GetWindowsDirectoryA
EnterCriticalSection
FileTimeToLocalFileTime
LocalFree
SetStdHandle
GetModuleHandleA
GetCommandLineA
GetCurrentThreadId
GetLastError
GetTickCount
GetCurrentThread
ExitProcess
HeapAlloc
GetProcessHeap
lstrlenA
GetStartupInfoA
msvcrt
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__dllonexit
_onexit
_exit
_strcmpi
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 308KB - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ