Static task
static1
Behavioral task
behavioral1
Sample
7258cbcb909ed24ae73edad55078f1590ddf386644a54557d5b5fb25d065bc98.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7258cbcb909ed24ae73edad55078f1590ddf386644a54557d5b5fb25d065bc98.exe
Resource
win10v2004-20220812-en
General
-
Target
7258cbcb909ed24ae73edad55078f1590ddf386644a54557d5b5fb25d065bc98
-
Size
225KB
-
MD5
2cc50de38f9e792116f3d7b897aafbd9
-
SHA1
bd44196b1f5cf67b695d8df8f3bc805466218774
-
SHA256
7258cbcb909ed24ae73edad55078f1590ddf386644a54557d5b5fb25d065bc98
-
SHA512
05664bc0d3caee9ddacaedde01df1af0a57256291683153e040539a59e9230ef669cf6d76856a7b64f469dfbbfeb3171c02b04f38614e666decd4d7a85fbf43a
-
SSDEEP
6144:Hcvpuacb3DmRUrTxlGgYP0Vlpho4wEouqIo:HcvpkrHrYPaaEouqIo
Malware Config
Signatures
Files
-
7258cbcb909ed24ae73edad55078f1590ddf386644a54557d5b5fb25d065bc98.exe windows x86
e44a1a53d103625a40f60599ebe9f749
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
_CIlog
_CIpow
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
CloseHandle
InitializeCriticalSection
WaitForSingleObject
PeekNamedPipe
HeapAlloc
HeapFree
EnterCriticalSection
HeapReAlloc
LeaveCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
CallWindowProcA
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.d Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d... Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ