Static task
static1
Behavioral task
behavioral1
Sample
78b457140e3acf925b68e9020d8da747639d67eff67d073a8ea5e9ae93cf418f.exe
Resource
win7-20220812-en
General
-
Target
78b457140e3acf925b68e9020d8da747639d67eff67d073a8ea5e9ae93cf418f
-
Size
348KB
-
MD5
07d079085631c71ecf60eb01a4ae5f40
-
SHA1
510e6824802da06112692ea697dc9a3eec5cd20d
-
SHA256
78b457140e3acf925b68e9020d8da747639d67eff67d073a8ea5e9ae93cf418f
-
SHA512
101efc7de63ec4cfe7c94adb3939f32aeb8bd3689cab4353166454198744a997442331239254c1cd324f5bf0f0c3aae1f01252147a3570836c26b0f2a5e8057f
-
SSDEEP
6144:/ZNj4IWhilNuvBjQ8wtsmJLVngK5Rzp7AOlYqqDLuHuBX6zykAbqkdR+:/nj4IW+ReKLVnD3p75qnuOiM8
Malware Config
Signatures
Files
-
78b457140e3acf925b68e9020d8da747639d67eff67d073a8ea5e9ae93cf418f.exe windows x86
e3571dd5a9e9b81772c8cabcd924caff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharUpperA
CharLowerA
kernel32
CreateThread
QueryPerformanceCounter
QueryPerformanceFrequency
CloseHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTickCount
GetProcAddress
LoadLibraryA
FreeLibrary
SetConsoleMode
GetStdHandle
SetConsoleCursorPosition
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
SetConsoleWindowInfo
SetConsoleScreenBufferSize
AllocConsole
GetEnvironmentVariableA
SetLocalTime
GetLocalTime
OutputDebugStringA
GetConsoleMode
ReadConsoleInputA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
SetEndOfFile
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCPInfo
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
HeapAlloc
HeapFree
HeapReAlloc
RtlUnwind
GetLastError
DeleteFileA
ExitThread
GetCurrentThreadId
ExitProcess
GetModuleHandleA
TerminateProcess
GetCurrentProcess
RaiseException
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
ReadFile
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
WriteFile
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlushFileBuffers
GetCurrentProcessId
GetFileAttributesA
CreateFileA
WideCharToMultiByte
GetTimeZoneInformation
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InterlockedExchange
wsock32
getsockname
gethostname
sendto
WSAGetLastError
recvfrom
gethostbyname
socket
setsockopt
inet_ntoa
bind
htons
WSACleanup
WSAStartup
closesocket
ioctlsocket
inet_addr
htonl
ntohs
winmm
timeGetTime
timeBeginPeriod
Sections
.text Size: 212KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE