Static task
static1
Behavioral task
behavioral1
Sample
07da08333fe396b2215f76133e870722ce305ca8b489c914d66299f046029cf8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
07da08333fe396b2215f76133e870722ce305ca8b489c914d66299f046029cf8.exe
Resource
win10v2004-20220812-en
General
-
Target
07da08333fe396b2215f76133e870722ce305ca8b489c914d66299f046029cf8.bin
-
Size
100KB
-
MD5
69f55b50834bbf01c3667d87444b0c4b
-
SHA1
c9875738c29ca59a487b3aab2ef65e3377daa90a
-
SHA256
07da08333fe396b2215f76133e870722ce305ca8b489c914d66299f046029cf8
-
SHA512
247af13e66294f06fd031bdc30ee7b93451ba06610273e6627068c4cf1ba5ee39e430668c91ef9e3402484989982b939a96554b890d73d5f9e4eb19c74371912
-
SSDEEP
3072:JeOZNwvruGx9jVggds9UsbbrkQFqhDQ265CycKQ:tIrpXgrUmzqx
Malware Config
Signatures
Files
-
07da08333fe396b2215f76133e870722ce305ca8b489c914d66299f046029cf8.bin.exe windows x86
44e6e52c4e5c42ba74451f1718bc14d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetFileSize
GetFullPathNameA
ReadFile
GetTempPathA
HeapAlloc
GetProcessHeap
VirtualAlloc
lstrcpynA
lstrcatA
lstrlenW
WideCharToMultiByte
EnumSystemCodePagesA
WriteConsoleW
CreateFileW
CloseHandle
DecodePointer
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
LCMapStringW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
RaiseException
winspool.drv
ord205
EXTDEVICEMODE
DeletePrintProvidorA
XcvDataW
FindFirstPrinterChangeNotification
ord202
odbc32
ord266
ord147
ord63
ord162
ord39
SearchStatusCode
ord157
ws2_32
WSACreateEvent
gethostbyaddr
WSASocketA
WSASend
WSAHtons
select
WSAGetServiceClassInfoW
send
WSAAsyncGetProtoByNumber
wsnmp32
ord302
ord320
ord106
ord605
ord202
ord500
ord999
pdh
PdhEnumMachinesW
PdhOpenQueryW
PdhSelectDataSourceW
PdhGetDefaultPerfCounterW
PdhGetRawCounterArrayW
PdhCollectQueryData
PdhGetDllVersion
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ