Static task
static1
Behavioral task
behavioral1
Sample
71c1c0fb0f3aebc12b48973e50804a17cf4016321035e53b9c403d6fdabcf087.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
71c1c0fb0f3aebc12b48973e50804a17cf4016321035e53b9c403d6fdabcf087.exe
Resource
win10v2004-20220812-en
General
-
Target
71c1c0fb0f3aebc12b48973e50804a17cf4016321035e53b9c403d6fdabcf087
-
Size
220KB
-
MD5
250005fb8aba4c7fa1fab68dcc4b2544
-
SHA1
011b86682b067c0d7757967f4a6831479dde8d10
-
SHA256
71c1c0fb0f3aebc12b48973e50804a17cf4016321035e53b9c403d6fdabcf087
-
SHA512
4bde8d9a1bb4aef661f8e843bf7993c313468b2490cd139ee2b7e2b16c499d336b9b4fa850590c0191f94e3a9720c58699b137b94e65c775e0af7f64184b5bc1
-
SSDEEP
3072:4hs2C9gQ8LX6L/qyeasSBtnW1M8RjD61i:uJwdeaVBtx8Ri1
Malware Config
Signatures
Files
-
71c1c0fb0f3aebc12b48973e50804a17cf4016321035e53b9c403d6fdabcf087.exe windows x86
4f29c29aa4efec6c5c34ec25bb0f39e3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord656
ord540
ord800
ord4275
ord3874
ord5290
ord5241
ord816
ord5789
ord562
ord6880
ord6605
ord5981
ord825
ord2864
ord2860
ord4299
ord2379
ord3402
ord567
ord1949
ord772
ord818
ord472
ord500
ord823
ord6442
ord6197
ord613
ord2754
ord289
ord755
ord640
ord2714
ord323
ord470
ord537
ord5875
ord2567
ord4133
ord4297
ord5788
ord6142
ord5860
ord3986
ord5606
ord1570
ord1197
ord6215
ord2414
ord5781
ord1168
ord5678
ord5736
ord6199
ord4287
ord2089
ord2438
ord6270
ord3693
ord3626
ord3663
ord535
ord860
ord3571
ord1641
ord3706
ord1640
ord5785
ord1644
ord1146
ord3654
ord686
ord384
ord4129
ord858
ord5710
ord2763
ord2859
ord2096
ord2546
ord3610
ord1175
ord4220
ord2584
ord5572
ord2915
ord2863
ord809
ord795
ord2614
ord556
ord1929
ord1088
ord2122
ord6358
ord3797
ord941
ord1200
ord926
ord2818
ord3619
ord3721
ord4396
ord3574
ord609
ord283
ord4160
ord2450
ord2452
ord2405
ord5053
ord3573
ord2575
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord2514
ord2621
ord1134
ord1199
ord1247
ord641
ord5265
ord4376
ord4853
ord4998
ord4710
ord6052
ord1775
ord5280
ord4425
ord3597
ord324
ord2302
ord4234
ord2097
ord2753
ord5450
ord6394
ord5440
ord6383
ord4424
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord4353
ord6374
ord5163
ord2385
ord4407
ord1776
ord4078
ord291
ord6055
ord1576
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
memmove
rand
free
realloc
memcpy
_setmbcp
_mbsstr
strstr
memset
_mbscmp
__CxxFrameHandler
_controlfp
kernel32
GlobalFree
Sleep
lstrlenA
lstrcpyA
LoadLibraryA
GetWindowsDirectoryA
WinExec
lstrcatA
HeapAlloc
FreeResource
GetProcAddress
VirtualProtect
IsBadReadPtr
HeapFree
SizeofResource
ExitProcess
lstrcmpiA
GetModuleHandleA
GetStartupInfoA
LockResource
LoadResource
FindResourceA
GlobalReAlloc
GetProcessHeap
FreeLibrary
LocalAlloc
InterlockedExchange
RaiseException
GetLastError
GlobalAlloc
comctl32
ImageList_GetIcon
ImageList_AddMasked
ImageList_GetImageInfo
ImageList_Draw
ImageList_SetBkColor
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ