Static task
static1
Behavioral task
behavioral1
Sample
d0bc305d72e0e3bfa93b58161d3db651f2a8eb57db8d7d9bf11e9691fe1b3a62.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0bc305d72e0e3bfa93b58161d3db651f2a8eb57db8d7d9bf11e9691fe1b3a62.exe
Resource
win10v2004-20220812-en
General
-
Target
d0bc305d72e0e3bfa93b58161d3db651f2a8eb57db8d7d9bf11e9691fe1b3a62
-
Size
364KB
-
MD5
82b6c491d926a8b3290066c09e821a20
-
SHA1
30fed000f8f02f68f4d4db47e329cca53d76a8b3
-
SHA256
d0bc305d72e0e3bfa93b58161d3db651f2a8eb57db8d7d9bf11e9691fe1b3a62
-
SHA512
6dac79a1792a44be33ba9ac55bdaf5521366122f8b69631e8d646e376f31ac01e4aef049b437faecbeb490da9e368b31d9505779d825a0ff8f7a7068e927139f
-
SSDEEP
6144:qQdrqhqcb7Ap/t7afgJqcxJTnXfiseaGbB2Po3egfRDfsJV3KM:qQpqhqcb7Ap/t7afmjXfisJOpIXKM
Malware Config
Signatures
Files
-
d0bc305d72e0e3bfa93b58161d3db651f2a8eb57db8d7d9bf11e9691fe1b3a62.exe windows x86
2f2f2f02d3c136a5032a15ba939e35e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
FindNextFileA
MultiByteToWideChar
GetVersionExA
LocalFree
FormatMessageA
GetLastError
SetEnvironmentVariableA
GetEnvironmentVariableA
GetTempPathA
DeleteFileA
HeapAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
CopyFileA
SetFileAttributesA
GetCurrentDirectoryA
GetFileAttributesA
FindFirstFileA
FindClose
SetCurrentDirectoryA
HeapFree
Sleep
CreateFileA
GetLocaleInfoW
LoadLibraryA
ReadFile
SetStdHandle
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetDriveTypeA
GetFullPathNameA
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
WriteFile
FlushFileBuffers
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
SetFilePointer
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
VirtualProtect
GetSystemInfo
VirtualQuery
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
SetEndOfFile
user32
GetTopWindow
advapi32
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 164KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qeajfr Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 144KB - Virtual size: 141KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE