Static task
static1
Behavioral task
behavioral1
Sample
162e63e37caca81e99da68e640f5ad3f233b4689bf73e4627e6ac2de712ba784.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
162e63e37caca81e99da68e640f5ad3f233b4689bf73e4627e6ac2de712ba784.exe
Resource
win10v2004-20220812-en
General
-
Target
162e63e37caca81e99da68e640f5ad3f233b4689bf73e4627e6ac2de712ba784
-
Size
235KB
-
MD5
61ae2c71ce692dc86e2accdef777fd90
-
SHA1
189c532dc1bf5c1d76c76c02ae3b9408a34172bb
-
SHA256
162e63e37caca81e99da68e640f5ad3f233b4689bf73e4627e6ac2de712ba784
-
SHA512
ef018db73e097eece865216136b513c7107b7b1e76b320e8153b535dd963b29bb2a32f7dcd60553f64c25b76ce4bff56221dfdb7bd83c6d183293b7ff63a0498
-
SSDEEP
6144:Kp95hZLiOeUg1oMCAvevih/5867863EApVAKOCBuHBNmTSIrgMqibOCC/snIlEOn:WiO4F7TxGA+
Malware Config
Signatures
Files
-
162e63e37caca81e99da68e640f5ad3f233b4689bf73e4627e6ac2de712ba784.exe windows x86
ffa37eefe0cf77d64508b5263f5cf3b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegOpenKeyA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CreateMutexA
CreateProcessA
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindAtomA
GetAtomNameA
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetThreadContext
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
ReleaseMutex
ReleaseSemaphore
ResumeThread
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
msvcrt
_stricmp
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
calloc
exit
fclose
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
malloc
memcmp
memcpy
memset
pow
printf
putchar
rand
realloc
signal
sprintf
strcmp
strcpy
strlen
vfprintf
Sections
.text Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/14 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/80 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/91 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/102 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ