Static task
static1
Behavioral task
behavioral1
Sample
0f0cdeb9a50ea3520056fb768024e61aca1e79530824d9755aa13b677ca17fec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0f0cdeb9a50ea3520056fb768024e61aca1e79530824d9755aa13b677ca17fec.exe
Resource
win10v2004-20220901-en
General
-
Target
0f0cdeb9a50ea3520056fb768024e61aca1e79530824d9755aa13b677ca17fec
-
Size
811KB
-
MD5
089df61612d79832ce2a51ba82cdb0f5
-
SHA1
9506cda0f33b2df5c3d4fac71344d53aa5f1e271
-
SHA256
0f0cdeb9a50ea3520056fb768024e61aca1e79530824d9755aa13b677ca17fec
-
SHA512
7ed593978c9f74187764e0a3b754ca7727492bd980c6816410549ac5218cda01fba2841e7b84a9c5af9234f33541dc8b1199787245400c44842b500fc2b5b69a
-
SSDEEP
24576:8c7FWCBRoruRcn5g9a/rV+3IEb3sSGM9Suze5T:8cpZBRYk8XcIDXia5T
Malware Config
Signatures
Files
-
0f0cdeb9a50ea3520056fb768024e61aca1e79530824d9755aa13b677ca17fec.exe windows x86
d382d5e6e657780a83c81315a1c9b838
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
HeapSize
CreateDirectoryW
GetEnvironmentStringsA
CreateFileA
SetLocalTime
SetLastError
CloseHandle
VirtualProtect
LoadLibraryA
Sleep
GetModuleFileNameA
DeleteFileA
GetStartupInfoA
lstrlenA
SetLastError
GetProcessHeap
OpenSemaphoreA
SetEvent
GetFileAttributesW
ReadConsoleA
CreateSemaphoreW
WriteConsoleA
GetTickCount
GlobalFree
user32
GetSysColor
IsZoomed
PeekMessageA
FindWindowA
DispatchMessageA
DestroyMenu
DispatchMessageA
IsWindow
CallWindowProcW
GetClassInfoA
SetFocus
DrawTextW
GetWindowLongA
traffic
TcDeleteFlow
TcAddFilter
TcDeleteFilter
TcAddFlow
advapi32
RegCloseKey
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE