Static task
static1
Behavioral task
behavioral1
Sample
8f4ecec7dd8ca5fc3171f21849cff4a6f7ee132c202b50f4912e1e36364ac708.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f4ecec7dd8ca5fc3171f21849cff4a6f7ee132c202b50f4912e1e36364ac708.exe
Resource
win10v2004-20220812-en
General
-
Target
8f4ecec7dd8ca5fc3171f21849cff4a6f7ee132c202b50f4912e1e36364ac708
-
Size
237KB
-
MD5
206510142d2cb15655001b8c92625d58
-
SHA1
57f8cbeb6d5aef8ac9338a8148518d5730998ed9
-
SHA256
8f4ecec7dd8ca5fc3171f21849cff4a6f7ee132c202b50f4912e1e36364ac708
-
SHA512
8cc14a4160d64d606f908308d374b5f07d79fbb0a20029bd204000e3d296ac278eedad19fc9640b44ca106fa72f02c099560aecfd8e4b8711114d629dd8e044d
-
SSDEEP
6144:CoRvVnZtywWgaxs3ztUldRyRfaYKBkwERwFd44uZXvlLsKaz:CoRvl3ywWrxYyysYKERwFd44C98z
Malware Config
Signatures
Files
-
8f4ecec7dd8ca5fc3171f21849cff4a6f7ee132c202b50f4912e1e36364ac708.exe windows x86
e44a1a53d103625a40f60599ebe9f749
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
_CIlog
_CIpow
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
CloseHandle
InitializeCriticalSection
WaitForSingleObject
PeekNamedPipe
HeapAlloc
HeapFree
EnterCriticalSection
HeapReAlloc
LeaveCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
CallWindowProcA
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.d Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d... Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ