Static task
static1
Behavioral task
behavioral1
Sample
899bbec115a7a6e6de758e2dc2ea7b2564e4fe823e3b9c70a0451969251bed9e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
899bbec115a7a6e6de758e2dc2ea7b2564e4fe823e3b9c70a0451969251bed9e.exe
Resource
win10v2004-20221111-en
General
-
Target
899bbec115a7a6e6de758e2dc2ea7b2564e4fe823e3b9c70a0451969251bed9e
-
Size
308KB
-
MD5
f2eb5b49908483c059012cca6b43c085
-
SHA1
282e2ab91fb3c67dcbe3ab5a421949cb23f9515e
-
SHA256
899bbec115a7a6e6de758e2dc2ea7b2564e4fe823e3b9c70a0451969251bed9e
-
SHA512
871e79131d52e43048c07ab2ed6353a94bcb91e85efdf5ad96d333367c75b792b1500c54963a670c84f50eb4c31a5c5e099fb2e890174df35a0e98fd20a0ace8
-
SSDEEP
6144:4JgCnCK34yarHvu6n60Y8Ju1BQkLm1PBReruhN0a9+rrk4:4JgCnp8Hvu660CRLmFF9wY4
Malware Config
Signatures
Files
-
899bbec115a7a6e6de758e2dc2ea7b2564e4fe823e3b9c70a0451969251bed9e.exe windows x86
7c8fd98a7001ad16bf5bb653f98d8b8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
VirtualFree
Sleep
GetCurrentThread
GetLastError
CloseHandle
HeapLock
WriteFile
VirtualAlloc
OpenSemaphoreA
OpenFile
HeapUnlock
GetModuleHandleA
GetCurrentProcessId
GetCurrentThreadId
HeapSize
DeleteFileA
ExitProcess
CreateEventA
LocalSize
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetProcAddress
VirtualAllocEx
GetCurrentProcess
ResumeThread
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
GetStartupInfoA
GetCommandLineA
GetVersionExA
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
user32
IsChild
PostMessageA
LoadStringA
IsWindowVisible
gdi32
CreatePatternBrush
advapi32
OpenProcessToken
psapi
GetModuleBaseNameA
GetProcessMemoryInfo
msvfw32
DrawDibDraw
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 285KB - Virtual size: 688KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ