Static task
static1
Behavioral task
behavioral1
Sample
342b05d6b435dfc767de88b61ea71f7ff20d394ed21ac54f1cb22a12de2081e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
342b05d6b435dfc767de88b61ea71f7ff20d394ed21ac54f1cb22a12de2081e9.exe
Resource
win10v2004-20220812-en
General
-
Target
342b05d6b435dfc767de88b61ea71f7ff20d394ed21ac54f1cb22a12de2081e9
-
Size
256KB
-
MD5
30d4989b73be3600064f715ab21db930
-
SHA1
e7b02f818700ff06f542851a6b50a60b17532372
-
SHA256
342b05d6b435dfc767de88b61ea71f7ff20d394ed21ac54f1cb22a12de2081e9
-
SHA512
0569ba9ed34206ea53571b7827933337a98a7c8d575f3bbbbb143e85e81b658ef1045c3c6560181913610f9c9ee5bb945e4bacd925ec159100ce398a2b044482
-
SSDEEP
6144:B0W735zijpVUgWe0cccPih/5867863EApVAKOCBuHBNmTSIrgMqibOCC/snIlEO1:PijtF7TxGAGzK
Malware Config
Signatures
Files
-
342b05d6b435dfc767de88b61ea71f7ff20d394ed21ac54f1cb22a12de2081e9.exe windows x86
ffa37eefe0cf77d64508b5263f5cf3b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegOpenKeyA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CreateMutexA
CreateProcessA
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindAtomA
GetAtomNameA
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetThreadContext
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
ReleaseMutex
ReleaseSemaphore
ResumeThread
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
msvcrt
_stricmp
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
calloc
exit
fclose
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
malloc
memcmp
memcpy
memset
pow
printf
putchar
rand
realloc
signal
sprintf
strcmp
strcpy
strlen
vfprintf
Sections
.text Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/14 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/80 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/91 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/102 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ