Static task
static1
Behavioral task
behavioral1
Sample
720f859d69ae1ee7e80dbe94f3ee8df0f1a588b17f7df14f0a9b5097e71cc307.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
720f859d69ae1ee7e80dbe94f3ee8df0f1a588b17f7df14f0a9b5097e71cc307.exe
Resource
win10v2004-20220812-en
General
-
Target
720f859d69ae1ee7e80dbe94f3ee8df0f1a588b17f7df14f0a9b5097e71cc307
-
Size
5.5MB
-
MD5
934810ee5be226fe7b169c78d95d97ad
-
SHA1
e3c6405f66989505b1a6698db6317c6ebff9df4c
-
SHA256
720f859d69ae1ee7e80dbe94f3ee8df0f1a588b17f7df14f0a9b5097e71cc307
-
SHA512
de11f74018b3e394d88ed552cfc9485f2eb684baac4d135a8895ced7b7d337d641a49ee6af6ac9adbaec90bd327aa5ea78254202d0b477d212d19e5f4d66d028
-
SSDEEP
12288:dtPPdPxPFdPZdPWPFdPZdPvPFdPZdP0PFdPZdPRPFdPZdPaPFdPZdPUPFdPZdPhc:dOFR
Malware Config
Signatures
Files
-
720f859d69ae1ee7e80dbe94f3ee8df0f1a588b17f7df14f0a9b5097e71cc307.exe windows x86
6e46c13660e5ca15644ef188236ffe8a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BaseCheckAppcompatCache
ClearCommBreak
CloseConsoleHandle
CommConfigDialogW
CreateActCtxA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileMappingW
CreateProcessA
CreateProcessW
DebugActiveProcess
DebugSetProcessKillOnExit
DecodeSystemPointer
DefineDosDeviceW
DeleteFileA
DeleteFileW
DeleteVolumeMountPointW
DnsHostnameToComputerNameW
DosDateTimeToFileTime
EnumCalendarInfoW
EnumResourceTypesA
EnumSystemLanguageGroupsA
EnumerateLocalComputerNamesA
EraseTape
ExtendVirtualBuffer
FindAtomA
FindFirstFileW
FindFirstVolumeMountPointW
FindFirstVolumeW
FindNextVolumeMountPointW
FindResourceExW
FreeUserPhysicalPages
FreeVirtualBuffer
GetBinaryType
GetCPInfo
GetCommMask
GetComputerNameA
GetComputerNameExA
GetConsoleAliasExesA
GetConsoleAliasesLengthA
GetConsoleAliasesW
GetConsoleCommandHistoryW
GetConsoleNlsMode
GetDevicePowerState
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetDriveTypeA
GetEnvironmentStrings
GetExpandedNameA
GetFileAttributesA
GetFileAttributesExA
GetFileSize
GetHandleContext
GetLogicalDriveStringsW
GetMailslotInfo
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleExA
GetNamedPipeInfo
GetNativeSystemInfo
GetNumaAvailableMemory
GetNumaNodeProcessorMask
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetProcAddress
GetProcessAffinityMask
GetProcessHeaps
GetProcessVersion
GetProfileSectionW
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeExW
GetStringTypeW
GetSystemDirectoryA
GetSystemTimes
GetSystemWow64DirectoryA
GetThreadIOPendingFlag
GetThreadPriority
GetThreadSelectorEntry
GetWindowsDirectoryA
GlobalSize
Heap32ListFirst
HeapAlloc
HeapSummary
HeapUnlock
HeapUsage
HeapWalk
InitAtomTable
InitializeSListHead
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFlags
LocalHandle
Module32First
MoveFileW
NlsConvertIntegerToString
OpenEventA
OpenFileMappingW
OpenThread
ProcessIdToSessionId
PulseEvent
RaiseException
RegisterConsoleIME
RegisterConsoleOS2
RegisterWaitForInputIdle
ReleaseActCtx
RemoveLocalAlternateComputerNameA
RestoreLastError
SearchPathA
SearchPathW
SetCommBreak
SetComputerNameA
SetConsoleCtrlHandler
SetConsoleOutputCP
SetConsoleTitleA
SetCurrentDirectoryW
SetFileTime
SetLastConsoleEventActive
SetMailslotInfo
SetPriorityClass
SetProcessShutdownParameters
SetSystemTime
SetVolumeLabelA
SignalObjectAndWait
SystemTimeToFileTime
Thread32First
TlsSetValue
Toolhelp32ReadProcessMemory
TransactNamedPipe
TransmitCommChar
UpdateResourceW
VerLanguageNameA
WaitForSingleObjectEx
WaitNamedPipeA
WriteFileGather
WritePrivateProfileStringW
WriteProfileStringA
WriteProfileStringW
_lopen
lstrcmp
lstrcmpi
lstrlenA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ