Static task
static1
Behavioral task
behavioral1
Sample
301ccad0e2521db1705c790b5f6d7b7e63fc2eb109d0a132e515e3b3537f63de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
301ccad0e2521db1705c790b5f6d7b7e63fc2eb109d0a132e515e3b3537f63de.exe
Resource
win10v2004-20220812-en
General
-
Target
301ccad0e2521db1705c790b5f6d7b7e63fc2eb109d0a132e515e3b3537f63de
-
Size
127KB
-
MD5
632be6e4bf0234608f789a6d6d4050d3
-
SHA1
0413d75da2595ac992cc8c7f7582c64426343c22
-
SHA256
301ccad0e2521db1705c790b5f6d7b7e63fc2eb109d0a132e515e3b3537f63de
-
SHA512
791fe12439049f501cc19161856c6c443e3196bc2fb3ebce477981c902a87db2628fadf399f4993a3586c88785963b773e0998c014575503876c196205d8959a
-
SSDEEP
3072:qfLjAzg4RtzWiRzr7dprQKmHnJuwAdg44SfRQ+Z:iylXQVuwAd
Malware Config
Signatures
Files
-
301ccad0e2521db1705c790b5f6d7b7e63fc2eb109d0a132e515e3b3537f63de.exe windows x86
aaceae69e7a86a5769c51006f880bf2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GlobalWire
HeapDestroy
RemoveDirectoryA
GetBinaryTypeA
AreFileApisANSI
GetProcAddress
WriteFile
LocalFree
LocalReAlloc
CreateFileMappingA
VirtualQuery
CallNamedPipeA
LockResource
GetLogicalDriveStringsA
Beep
CommConfigDialogA
WritePrivateProfileStructA
QueryDosDeviceA
IsProcessorFeaturePresent
GetStdHandle
DuplicateHandle
GetWindowsDirectoryA
LocalShrink
CreateFiber
GlobalSize
VirtualProtectEx
MulDiv
VirtualLock
LocalHandle
GetSystemDefaultLCID
GetExitCodeThread
GetSystemDirectoryA
GetCurrentThreadId
CreateDirectoryExA
GetLastError
CreateRemoteThread
UpdateResourceA
LocalFlags
DisconnectNamedPipe
FlushFileBuffers
FindCloseChangeNotification
SignalObjectAndWait
ReadProcessMemory
MapViewOfFileEx
WriteProfileSectionA
WriteProcessMemory
GetThreadPriority
CancelIo
GetProcessWorkingSetSize
DefineDosDeviceA
GlobalLock
GetProcessHeap
HeapAlloc
PeekConsoleInputA
GetTempPathA
FindFirstChangeNotificationA
GetFileSize
FlushConsoleInputBuffer
HeapValidate
CreateMailslotA
GetCPInfo
GetNamedPipeInfo
GetCurrentProcess
BeginUpdateResourceA
GlobalAlloc
GetProfileStringA
PeekNamedPipe
GetCPInfoExA
GetConsoleCP
GetExitCodeProcess
CreateWaitableTimerA
GetPrivateProfileSectionA
GetLongPathNameA
CloseHandle
SetLastError
GetLargestConsoleWindowSize
SleepEx
WaitForMultipleObjectsEx
GetHandleInformation
GetProcessVersion
CopyFileExA
HeapFree
FreeResource
GetProfileSectionA
GetCurrentProcessId
IsDebuggerPresent
OutputDebugStringA
GetSystemDefaultLangID
GetConsoleOutputCP
IsBadStringPtrA
GetNamedPipeHandleStateA
ClearCommError
UnlockFile
OpenFileMappingA
DeviceIoControl
GetFileAttributesA
CreateEventA
InitAtomTable
FindResourceA
VirtualQueryEx
VirtualUnlock
CreateDirectoryA
GetModuleFileNameA
FindAtomA
AllocConsole
FindClose
GetCommTimeouts
PostQueuedCompletionStatus
LockFile
VirtualAlloc
CreateConsoleScreenBuffer
GetFileType
GetDiskFreeSpaceA
GetVersion
SetFileAttributesA
GetUserDefaultLCID
GetThreadSelectorEntry
GetCommConfig
LocalUnlock
GetThreadContext
GetLogicalDrives
LocalCompact
IsBadWritePtr
SizeofResource
ReleaseMutex
GetModuleHandleA
GlobalFree
GlobalHandle
GlobalFlags
CreateFileA
SetFileTime
GetTickCount
GetLocalTime
SetEvent
GlobalCompact
IsValidCodePage
LoadLibraryA
GlobalUnWire
IsSystemResumeAutomatic
GetProcessTimes
GetThreadPriorityBoost
FlushViewOfFile
VirtualFreeEx
MoveFileExA
GetCommandLineA
GetStartupInfoA
msvcrt
srand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE