Static task
static1
Behavioral task
behavioral1
Sample
b397b04627526de096d29921120a3ab7137374bca89f4ae783dc5c470e5e66aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b397b04627526de096d29921120a3ab7137374bca89f4ae783dc5c470e5e66aa.exe
Resource
win10v2004-20220812-en
General
-
Target
b397b04627526de096d29921120a3ab7137374bca89f4ae783dc5c470e5e66aa
-
Size
76KB
-
MD5
adbeb22fb0476aa360c6481aa5bdf578
-
SHA1
d976d4d60333e3443f12f8fd1b4ecd8ce9664fe7
-
SHA256
b397b04627526de096d29921120a3ab7137374bca89f4ae783dc5c470e5e66aa
-
SHA512
d4b3f9e7cfc16b77e05a5f787c5d443f8ce2537a2fc9792e6a426c053547bdcdf4c627f847a5b3f16e65f857a6b624186392207db33b076ffe000550efc69128
-
SSDEEP
768:tFqolaDUg/MKQGHn4VuUqVR8l8WXJUj2osGcm9Thmc4vdfLwUWHy24c0D7suBxPO:n3LFG7wR5UjjcNcOfLwUWP4wJd
Malware Config
Signatures
Files
-
b397b04627526de096d29921120a3ab7137374bca89f4ae783dc5c470e5e66aa.exe windows x86
3ec12ad8de7eeed92092ea3bd7ad4cb0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__CxxFrameHandler
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
strncmp
rand
atoi
atol
malloc
_except_handler3
free
realloc
exit
strrchr
??2@YAPAXI@Z
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
_CxxThrowException
_stricmp
_strnicmp
kernel32
GetCurrentThread
GetStartupInfoA
GetModuleHandleA
GetSystemTime
CreateMutexA
GetLastError
OpenEventA
GetVersionExA
GetSystemInfo
GlobalMemoryStatusEx
FreeLibrary
HeapFree
IsBadReadPtr
VirtualFree
VirtualProtect
GetProcessHeap
HeapAlloc
GetTempPathA
MoveFileA
MoveFileExA
SetFileAttributesA
GetSystemDirectoryA
DeleteFileA
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcatA
GetCurrentProcess
SetPriorityClass
SetThreadPriority
ResumeThread
GetProcAddress
LoadLibraryA
Sleep
VirtualAlloc
InitializeCriticalSection
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
InterlockedExchange
CancelIo
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
GetFileAttributesA
CreateProcessA
lstrcpyA
lstrlenA
TerminateThread
CreateThread
user32
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenInputDesktop
OpenDesktopA
ExitWindowsEx
CloseDesktop
ws2_32
setsockopt
connect
htons
WSACleanup
socket
select
recv
closesocket
send
gethostname
getsockname
WSAStartup
gethostbyname
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ