Static task
static1
Behavioral task
behavioral1
Sample
da49f84d6bc01bae7d9e6c2e2085d12934c3f4c9462be48f629b33dd64917c5e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da49f84d6bc01bae7d9e6c2e2085d12934c3f4c9462be48f629b33dd64917c5e.exe
Resource
win10v2004-20220812-en
General
-
Target
da49f84d6bc01bae7d9e6c2e2085d12934c3f4c9462be48f629b33dd64917c5e
-
Size
224KB
-
MD5
48e15f3e22b9f2ee718b85cac45391e0
-
SHA1
a14a998315cd02b9beb646570ef8642e613a092c
-
SHA256
da49f84d6bc01bae7d9e6c2e2085d12934c3f4c9462be48f629b33dd64917c5e
-
SHA512
524b1c9082994898dd6c64a203b9abf18f2b4b14506344edd1291284814c3c77a17c1e9db8cc871a55ff405a9c998a191117299490080f7a8b92ae31230cbc87
-
SSDEEP
3072:HGAYXZ5ZZO+8wIt7bDaiDA/KxfRCJLqhJlefroHUcpzwheHtKmHq9hOp1WZBj:mACBIteivfRlhJlef2lzw6KEq6u3
Malware Config
Signatures
Files
-
da49f84d6bc01bae7d9e6c2e2085d12934c3f4c9462be48f629b33dd64917c5e.exe windows x86
60511adc6497a6aba65ae2edee54af6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
CloseHandle
Sleep
GetLastError
GetLocaleInfoW
HeapSize
SetEndOfFile
GetTimeZoneInformation
ReleaseMutex
WaitForSingleObject
OpenEventA
SetEvent
CreateEventA
WaitForMultipleObjects
GetTickCount
GetCurrentProcessId
CreateMutexA
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
GetFileSize
CreateFileA
GetTempPathA
UnmapViewOfFile
FlushViewOfFile
GlobalAlloc
GlobalFree
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameA
LocalFree
lstrlenA
GetVersion
MultiByteToWideChar
lstrcmpA
LocalAlloc
ReadFile
WriteFile
WideCharToMultiByte
ResetEvent
DeviceIoControl
GetPrivateProfileIntA
GetPrivateProfileStringA
HeapAlloc
HeapFree
GetModuleHandleA
GetCommandLineA
GetSystemTimeAsFileTime
ExitThread
GetCurrentThreadId
TlsSetValue
TlsGetValue
CreateThread
EnterCriticalSection
LeaveCriticalSection
GetACP
GetOEMCP
GetCPInfo
TlsFree
SetLastError
TlsAlloc
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetFilePointer
ExitProcess
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
VirtualProtect
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
RtlUnwind
InitializeCriticalSection
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
QueryPerformanceCounter
GetVersionExA
advapi32
RegOpenKeyA
RegCloseKey
RegQueryValueExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CloseServiceHandle
OpenSCManagerA
QueryServiceStatus
OpenServiceA
ControlService
DeleteService
StartServiceA
CreateServiceA
GetUserNameA
wsock32
send
connect
gethostname
recv
getpeername
WSAGetLastError
bind
getsockname
closesocket
user32
wsprintfA
GetSystemMetrics
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE