Static task
static1
Behavioral task
behavioral1
Sample
79d07a87aa717e29de1668ad56c71973e554250cdfa16a81381e2cc1d1b116b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79d07a87aa717e29de1668ad56c71973e554250cdfa16a81381e2cc1d1b116b9.exe
Resource
win10v2004-20220901-en
General
-
Target
79d07a87aa717e29de1668ad56c71973e554250cdfa16a81381e2cc1d1b116b9
-
Size
135KB
-
MD5
6577ec86fd62167d32ca242a5d7cf8e0
-
SHA1
4bda9d335d7fd747d6d9a522c4e59119fc9f46eb
-
SHA256
79d07a87aa717e29de1668ad56c71973e554250cdfa16a81381e2cc1d1b116b9
-
SHA512
ffa09adfcf0164822ac3816c4d97fece2eafe2e02c882c0c82b7db5ae936adcde1a730857e4b7d91c393f123a2690ab421b0e006164431f8c7c0aac835b33a76
-
SSDEEP
3072:vMJGkqkEKC4j/d0Neqlt0uRshZV8G0P8LWG+8vouSBvqjmzbX89Zb:U5CWFGHIxh78G0PNGSBRzov
Malware Config
Signatures
Files
-
79d07a87aa717e29de1668ad56c71973e554250cdfa16a81381e2cc1d1b116b9.exe windows x86
87e8bebaf1e830049669f4dab32999c7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
user32
LoadAcceleratorsA
LoadCursorA
LoadIconA
RegisterClassA
ws2_32
WSACleanup
WSAStartup
kernel32
GetLastError
GetProcAddress
GetTickCount
LoadLibraryA
VirtualProtect
GetModuleHandleA
ulib
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??0ARRAY@@QAE@XZ
??0CLASS_DESCRIPTOR@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
??0MULTIPLE_PATH_ARGUMENT@@QAE@XZ
??0PROGRAM@@IAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??1PROGRAM@@UAE@XZ
?Compare@OBJECT@@UBEJPBV1@@Z
?DisplayMessage@PROGRAM@@UBAEKW4MESSAGE_TYPE@@PADZZ
?DisplayMessage@PROGRAM@@UBEEKW4MESSAGE_TYPE@@@Z
?Fatal@PROGRAM@@UBAXKKPADZZ
?Fatal@PROGRAM@@UBEXXZ
?GetStandardError@PROGRAM@@UAEPAVSTREAM@@XZ
?GetStandardInput@PROGRAM@@UAEPAVSTREAM@@XZ
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@CLASS_DESCRIPTOR@@QAEEXZ
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
?PutSwitches@ARGUMENT_LEXEMIZER@@QAEXPBD@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?Usage@PROGRAM@@UBEXXZ
?ValidateVersion@PROGRAM@@UBEXKK@Z
?Initialize@STRING_ARGUMENT@@QAEEPAD@Z
ntdll
RtlFreeHeap
RtlAllocateHeap
Sections
AUTO Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 127KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ