help_funcs
Static task
static1
Behavioral task
behavioral1
Sample
afd9f4d0c8415b4b67e3e9e18c0a0ccf164c6ceff1b6e4d5371c9c73e2d9cc0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afd9f4d0c8415b4b67e3e9e18c0a0ccf164c6ceff1b6e4d5371c9c73e2d9cc0b.exe
Resource
win10v2004-20221111-en
General
-
Target
afd9f4d0c8415b4b67e3e9e18c0a0ccf164c6ceff1b6e4d5371c9c73e2d9cc0b
-
Size
86KB
-
MD5
339a38824edb06eae25e5fc935d4d040
-
SHA1
cabb38ba29acf39002364098270780964f9421e7
-
SHA256
afd9f4d0c8415b4b67e3e9e18c0a0ccf164c6ceff1b6e4d5371c9c73e2d9cc0b
-
SHA512
e8aaf3d2384deb4b391909749e954804cc5c18d36a29ca4b0195adbc21ea19a074a136084c1da98d49f1b57feb5afd4ed43e190d18ceb2776524cb51abacd802
-
SSDEEP
1536:NzT4cRcArEmQ52KnnnnvqdoEWGS3Kr0S:F7PQnvmo5GMKr
Malware Config
Signatures
Files
-
afd9f4d0c8415b4b67e3e9e18c0a0ccf164c6ceff1b6e4d5371c9c73e2d9cc0b.exe windows x86
4277de1124b80e648a2505cf775d57b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
wcsstr
sprintf
memset
memcpy
kernel32
ExitProcess
InterlockedExchange
WaitForSingleObject
GetProcAddress
GetModuleHandleA
CloseHandle
CreateThread
FreeLibrary
GetComputerNameW
LoadLibraryW
GetLastError
lstrcmpiW
ExpandEnvironmentStringsW
CreateProcessW
ConnectNamedPipe
TerminateProcess
ReadFile
CreateNamedPipeA
CreateEventW
ReleaseMutex
WriteFileEx
ResumeThread
LocalAlloc
GetCommandLineW
HeapAlloc
LoadLibraryExW
GetCurrentProcess
SetEnvironmentVariableW
HeapFree
SleepEx
GetProcessHeap
Sleep
GetVersionExW
LoadLibraryA
CreateMutexW
CreateEventA
RaiseException
user32
MessageBoxA
Exports
Exports
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE