Static task
static1
Behavioral task
behavioral1
Sample
b735ff40ecf2eecfaff99f456d7c204e4353d2902d331de6d5fc5077ef56aac6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b735ff40ecf2eecfaff99f456d7c204e4353d2902d331de6d5fc5077ef56aac6.exe
Resource
win10v2004-20220901-en
General
-
Target
b735ff40ecf2eecfaff99f456d7c204e4353d2902d331de6d5fc5077ef56aac6
-
Size
212KB
-
MD5
c0fae5f7fb41b8ccebf5a6148c72e492
-
SHA1
0789259ba1cdc725439f7163a62d83b6756e376b
-
SHA256
b735ff40ecf2eecfaff99f456d7c204e4353d2902d331de6d5fc5077ef56aac6
-
SHA512
ce32225ded8df42f8af1a0f73d36ef352741fc1e7d3b711f56960b6c120448bee23495ba0a19b775b0bead6dc9d4bfe198f524d68474f23de27c553a1df11f30
-
SSDEEP
6144:jJWP2jsgBx0XutqfVZwAki+fsbQ8rzXqoYfwC53Txe:jJWP2jsIx0XuAfMACsDreX5Q
Malware Config
Signatures
Files
-
b735ff40ecf2eecfaff99f456d7c204e4353d2902d331de6d5fc5077ef56aac6.exe windows x86
68e8026a376d7b7ef3a4f57561a6bbd0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringW
GetDiskFreeSpaceExW
WideCharToMultiByte
LeaveCriticalSection
SetEvent
EnterCriticalSection
WaitForSingleObject
ResetEvent
GetTickCount
WaitForMultipleObjects
InterlockedExchange
CreateEventW
InitializeCriticalSection
CloseHandle
DeleteCriticalSection
GetModuleFileNameW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
WriteFile
SetNamedPipeHandleState
WaitNamedPipeW
CreateFileW
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
ReadFile
GetOverlappedResult
SetWaitableTimer
GetModuleFileNameA
MultiByteToWideChar
GetProcAddress
LoadLibraryA
FreeLibrary
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
GetSystemTimeAsFileTime
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileW
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
CreateThread
HeapFree
GetPrivateProfileStringW
HeapAlloc
GetProcessHeap
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetFullPathNameW
GetCurrentDirectoryA
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetACP
GetOEMCP
IsValidCodePage
HeapSize
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetDriveTypeA
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
CopyFileW
DeleteFileW
GetLastError
GetPrivateProfileIntW
GetVersionExA
Sleep
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Sections
.text Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE