Static task
static1
Behavioral task
behavioral1
Sample
0d0bb4cd3080ed4a39743d57010f04213f45413e13c7133549114383b47a7388.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d0bb4cd3080ed4a39743d57010f04213f45413e13c7133549114383b47a7388.exe
Resource
win10v2004-20220812-en
General
-
Target
0d0bb4cd3080ed4a39743d57010f04213f45413e13c7133549114383b47a7388
-
Size
110KB
-
MD5
7bffef60b33c169ac328c60c2f6737dd
-
SHA1
704336b8ed363d4fd23eada2ad33af7d0e76bc7c
-
SHA256
0d0bb4cd3080ed4a39743d57010f04213f45413e13c7133549114383b47a7388
-
SHA512
5877f5c6a818b38b54516f0445276f4afddf774a2257f07c48b457656313d4648a24a6ed520c3789aa5fc0c0647c69d9a00cacafa6df6b353e6b6fb0ee1fc8a1
-
SSDEEP
3072:AOTaDTUUJ511F6lmed2iFRtWP5DWRsfSh4RMW:fT8oUvWmedVRuqRTW
Malware Config
Signatures
Files
-
0d0bb4cd3080ed4a39743d57010f04213f45413e13c7133549114383b47a7388.exe windows x86
f5ce3558998a6d2f61fa8e06d33dc1c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegOpenKeyExA
DeregisterEventSource
RegDeleteKeyA
InitializeSecurityDescriptor
RegCloseKey
RegDeleteValueA
RegSetValueExA
ReportEventA
SetSecurityDescriptorDacl
RegisterEventSourceA
RegQueryValueExA
kernel32
GetExitCodeThread
SetEvent
GetFileAttributesA
TlsFree
MoveFileA
UnhandledExceptionFilter
CreateSemaphoreA
IsProcessorFeaturePresent
GetSystemInfo
ReleaseMutex
HeapCreate
GetProcessHeap
GetUserDefaultLangID
GetFileSize
FindNextFileA
SetFilePointer
CreateThread
lstrlenA
ReadFileEx
InterlockedIncrement
GlobalFree
OutputDebugStringA
DeleteFileA
lstrcmpA
GlobalMemoryStatus
WaitForSingleObjectEx
LoadLibraryA
HeapDestroy
SetEndOfFile
CreateMutexA
GetTickCount
TerminateProcess
DeleteCriticalSection
HeapFree
WriteFileEx
WaitForSingleObject
WaitForMultipleObjectsEx
CreateDirectoryA
TlsSetValue
GetCurrentThread
InitializeCriticalSection
FindClose
GetModuleHandleA
CloseHandle
MapViewOfFile
ReadFile
EnterCriticalSection
lstrcpyA
LCMapStringW
GetSystemDefaultLangID
GetLocalTime
FindFirstFileA
CopyFileA
ResetEvent
CreateFileA
GetDriveTypeA
IsValidLocale
VirtualQuery
SleepEx
CreateFileMappingA
ExpandEnvironmentStringsA
GetOverlappedResult
GetCurrentThreadId
Sleep
HeapAlloc
TlsAlloc
QueryPerformanceCounter
DebugBreak
CreateEventA
GetDiskFreeSpaceA
ReleaseSemaphore
TlsGetValue
LeaveCriticalSection
QueryPerformanceFrequency
FlushFileBuffers
UnmapViewOfFile
VirtualFree
GetCurrentProcess
GetLastError
GetProcAddress
FreeLibrary
WriteFile
GlobalAlloc
GetCurrentProcessId
GetModuleFileNameA
ReadProcessMemory
SetThreadPriority
VirtualAlloc
RemoveDirectoryA
GetVersionExA
winmm
auxSetVolume
msvcrt
_iob
strpbrk
_beep
malloc
_initterm
_makepath
_adjust_fdiv
_itoa
_stricmp
strtok
exit
_snprintf
fprintf
_ltoa
_splitpath
toupper
strncpy
vprintf
_ftol
atol
rand
swprintf
fclose
isprint
strchr
_beginthread
_strnicmp
time
sprintf
strtoul
memmove
vsprintf
printf
_vsnprintf
wcslen
_chdir
free
_purecall
_onexit
fflush
_ultoa
__dllonexit
Sections
.textbss Size: 43KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.ctext Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE