Static task
static1
Behavioral task
behavioral1
Sample
27fd3656894aacbdffeda72aade39810a781291db2c30a1001b48b7e01b8b1ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
27fd3656894aacbdffeda72aade39810a781291db2c30a1001b48b7e01b8b1ff.exe
Resource
win10v2004-20220812-en
General
-
Target
27fd3656894aacbdffeda72aade39810a781291db2c30a1001b48b7e01b8b1ff
-
Size
234KB
-
MD5
d3ab060d0a7c7e3d1956712fc6521d9a
-
SHA1
16086d34f1e386a15e0ce4778dc060350b211ec5
-
SHA256
27fd3656894aacbdffeda72aade39810a781291db2c30a1001b48b7e01b8b1ff
-
SHA512
13900b2f03f65d9b463ae11c2661f79c52a20068e85ec8688664e49c7960acb1b53b08e002ba209cf9fcf52fa67ec04eba1538032efa6c695cb0b544c0223eea
-
SSDEEP
6144:LQ4okaHvYdF1QZmpTnTP2jREH5lqXuQ1aJZ:ukiYD1cgujR4qfoZ
Malware Config
Signatures
Files
-
27fd3656894aacbdffeda72aade39810a781291db2c30a1001b48b7e01b8b1ff.exe windows x86
f49d1cc9a4742a07d42f4af678d8b145
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memmove
_strnicmp
strncmp
strncpy
_strdup
free
memcpy
strlen
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapAlloc
HeapFree
TlsAlloc
TlsGetValue
HeapReAlloc
TlsSetValue
WaitForMultipleObjects
EnterCriticalSection
CloseHandle
LeaveCriticalSection
GetCurrentThreadId
InitializeCriticalSection
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
CallWindowProcA
Sections
.code Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tvfsj Size: 208KB - Virtual size: 212KB