Static task
static1
Behavioral task
behavioral1
Sample
560072c684aa1eb5d38b29213d527e4c1b7a4d3af5d3277646cc3c6191a22bed.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
560072c684aa1eb5d38b29213d527e4c1b7a4d3af5d3277646cc3c6191a22bed.exe
Resource
win10v2004-20221111-en
General
-
Target
560072c684aa1eb5d38b29213d527e4c1b7a4d3af5d3277646cc3c6191a22bed
-
Size
688KB
-
MD5
bcff9c321609a95a70e7ca651162b3a4
-
SHA1
af2b4f95acd6ef28fb33c52e5cca22e57cdd2b5d
-
SHA256
560072c684aa1eb5d38b29213d527e4c1b7a4d3af5d3277646cc3c6191a22bed
-
SHA512
bb8debddf86f3d232f6ac958c7875682e099e63cd2d98dd3069fa4d2fb3f918ba28f82382dcbe7369b70096085cf390d3a9e786eba232440df7c26728c7bd6e0
-
SSDEEP
12288:yeJMECzB6Vwr/Yb08pSHeqNAMh1TI/bCw24FPp7r24dhkHR3SjI:yeFCzB6VCi0D+GF1ZwbH7SfHd/
Malware Config
Signatures
Files
-
560072c684aa1eb5d38b29213d527e4c1b7a4d3af5d3277646cc3c6191a22bed.exe windows x86
fee7603b176785888fc9ef2c073ff5ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
WriteFile
ResumeThread
ReadFile
GetThreadPriority
LoadLibraryA
VirtualAlloc
GetFileSize
GetModuleHandleA
WaitForSingleObject
VirtualQuery
GetTickCount
GetProcAddress
Sleep
GetSystemInfo
VirtualProtect
SetStdHandle
CloseHandle
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsBadWritePtr
IsBadReadPtr
HeapValidate
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
RtlUnwind
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
HeapDestroy
HeapCreate
HeapFree
VirtualFree
InitializeCriticalSection
HeapAlloc
HeapReAlloc
GetACP
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
RaiseException
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
SetFocus
wsprintfA
DestroyWindow
LoadImageA
gdi32
SelectObject
CreatePen
ole32
CoInitialize
winmm
mciSendCommandA
auxSetVolume
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.EPV Size: 4KB - Virtual size: 597B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 500KB - Virtual size: 499KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ