Static task
static1
Behavioral task
behavioral1
Sample
65cb10080da6180ef84b66107398f20b3ed702e0d37819f7fc837ecd4da5d7fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65cb10080da6180ef84b66107398f20b3ed702e0d37819f7fc837ecd4da5d7fb.exe
Resource
win10v2004-20220901-en
General
-
Target
65cb10080da6180ef84b66107398f20b3ed702e0d37819f7fc837ecd4da5d7fb
-
Size
146KB
-
MD5
627cf4edb54574b9d4f9edd80a6a86c8
-
SHA1
bed54dc440a06cf9deb9515fa7f511d32dc57dc9
-
SHA256
65cb10080da6180ef84b66107398f20b3ed702e0d37819f7fc837ecd4da5d7fb
-
SHA512
36dc015f9efbfcbbdfa609a3d1dc8767b1753afc92cec54fa601d2e13d100846fb3b1cec882c22b8010fa1274aeab122a22d4b8c576248816f7e92572bc7f66e
-
SSDEEP
3072:J2C8G4IJgYKEYWIJLWyexh4XqocpoAyQ3HhKN5:nQICYWbW/xeXqbpdychK/
Malware Config
Signatures
Files
-
65cb10080da6180ef84b66107398f20b3ed702e0d37819f7fc837ecd4da5d7fb.exe windows x86
c84b45dc7f8ec01f2c47d0b1cdab8e2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
IsCharAlphaNumericA
wsprintfA
GetClassNameA
oleaut32
GetErrorInfo
msvcrt
__p__fmode
__set_app_type
_except_handler3
_controlfp
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
wcslen
toupper
_iob
fprintf
_splitpath
??2@YAPAXI@Z
_vsnprintf
_CxxThrowException
calloc
fseek
ftell
fread
strtoul
strchr
atoi
_strlwr
strrchr
fopen
fgets
fclose
system
strcpy
memcmp
strcat
wcscat
strstr
_EH_prolog
__CxxFrameHandler
free
malloc
strcmp
sscanf
memcpy
srand
strncpy
strtok
memset
rand
_snprintf
strlen
sprintf
strncat
_strdup
exit
_strcmpi
kernel32
LocalAlloc
lstrcmpiA
Sleep
CreateThread
GetModuleFileNameA
ExitThread
GetLastError
InitializeCriticalSectionAndSpinCount
LocalFree
GetStartupInfoA
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetWindowsDirectoryA
GetFileTime
SetFileTime
GetFileAttributesA
CreateMutexA
ReleaseMutex
ExpandEnvironmentStringsA
lstrlenA
lstrcmpA
lstrcpynA
lstrcpyA
lstrcatA
GetCurrentThread
GetCurrentProcess
TerminateProcess
OpenProcess
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetLocaleInfoA
GetSystemDirectoryA
GetDateFormatA
GetTimeFormatA
GlobalMemoryStatus
GetVersion
GetCurrentProcessId
GetCurrentDirectoryA
DeviceIoControl
TerminateThread
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetVersionExA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
WaitForSingleObject
GetTempPathA
SetFileAttributesA
CopyFileA
MoveFileA
DeleteFileA
ExitProcess
CreateFileA
TransactNamedPipe
WriteFile
CloseHandle
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTickCount
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 64KB - Virtual size: 423KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE