Static task
static1
Behavioral task
behavioral1
Sample
187a7100257ad63bdee3537ebf030781e9cda59e0cc300e5e17a7a424d5ef211.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
187a7100257ad63bdee3537ebf030781e9cda59e0cc300e5e17a7a424d5ef211.exe
Resource
win10v2004-20220812-en
General
-
Target
187a7100257ad63bdee3537ebf030781e9cda59e0cc300e5e17a7a424d5ef211
-
Size
120KB
-
MD5
4770c37e36b9749181b76a5ebb37ad07
-
SHA1
526d400f5c8bcbe19488b0180e0bda46763d3df5
-
SHA256
187a7100257ad63bdee3537ebf030781e9cda59e0cc300e5e17a7a424d5ef211
-
SHA512
d4a9918c11ce419e536423251ccb9d9c0e56f4148f2df397f424a54be4b49fd23f7fe60af28ecd488c68180de96e497edc328a2de8959fb5916ec4cac09b67ef
-
SSDEEP
1536:KDwSTGFq04EqYrI8rWypLdoMxTXWj1fPJI6nUZu69sb18Tl:IGo0QuWcLfTGj1PJI6nU8Ysb1ol
Malware Config
Signatures
Files
-
187a7100257ad63bdee3537ebf030781e9cda59e0cc300e5e17a7a424d5ef211.exe windows x86
56125854fc480aaf825014265d45e395
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
xolehlp
DtcGetTransactionManagerExA
kernel32
DuplicateHandle
GetCurrentProcess
OpenProcess
GetProcessHeap
QueueUserAPC
GetProcessIdOfThread
OpenThread
HeapFree
GetCurrentThread
GetEnvironmentVariableA
CloseHandle
LoadLibraryA
GetProcAddress
LCMapStringW
Sleep
GetLastError
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetCommandLineA
GetVersionExA
GetModuleHandleA
RaiseException
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
HeapAlloc
HeapReAlloc
SetStdHandle
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
ExitProcess
VirtualAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
RtlUnwind
SetUnhandledExceptionFilter
SetConsoleCtrlHandler
FreeLibrary
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
VirtualQuery
InterlockedExchange
IsBadCodePtr
FlushFileBuffers
SetFilePointer
VirtualProtect
GetSystemInfo
GetLocaleInfoA
LCMapStringA
advapi32
ImpersonateSelf
LookupAccountSidA
SetThreadToken
OpenThreadToken
DuplicateTokenEx
CreateProcessAsUserA
GetTokenInformation
GetUserNameA
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE