Static task
static1
Behavioral task
behavioral1
Sample
32ae4896a075153246fe05695357b535877bf1346c1b1f7e836b7dcdd9eb24db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32ae4896a075153246fe05695357b535877bf1346c1b1f7e836b7dcdd9eb24db.exe
Resource
win10v2004-20220812-en
General
-
Target
32ae4896a075153246fe05695357b535877bf1346c1b1f7e836b7dcdd9eb24db
-
Size
152KB
-
MD5
923d4ddfe981f3b81ca2f4f49bf32780
-
SHA1
866a5721b73611f86260512219e051c6ae462ca9
-
SHA256
32ae4896a075153246fe05695357b535877bf1346c1b1f7e836b7dcdd9eb24db
-
SHA512
8c55ecc87ad1aa4840b2316417080fd0f6e6ca7978616ad7422ac148b072bc20584958929024045fb4f643174497c9c929d6ed5f03bd301347f4dcfb7c01c742
-
SSDEEP
768:KZVWLla88tpe+QZ6lHzy/YR1Y9mZCEIRH4eGlFDBUs1lyu5OoKU03m:KqM8ixQAlHu/AGCI94eGlFDus38oKe
Malware Config
Signatures
Files
-
32ae4896a075153246fe05695357b535877bf1346c1b1f7e836b7dcdd9eb24db.exe windows x86
3d073ae750a970f89f06699507aa56c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameA
CloseHandle
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetModuleHandleA
OpenProcess
VirtualProtect
WaitForSingleObject
CreateThread
VirtualAlloc
ExitThread
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetLastError
SetConsoleCtrlHandler
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
FlushFileBuffers
SetFilePointer
LCMapStringA
LCMapStringW
SetStdHandle
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
12E3F5 Size: - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE