Static task
static1
Behavioral task
behavioral1
Sample
84ee6f058a2fa6f9a978f1393e1e38cf51d9043a88ab1cedaa17646397d63107.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84ee6f058a2fa6f9a978f1393e1e38cf51d9043a88ab1cedaa17646397d63107.exe
Resource
win10v2004-20221111-en
General
-
Target
84ee6f058a2fa6f9a978f1393e1e38cf51d9043a88ab1cedaa17646397d63107
-
Size
126KB
-
MD5
1d497db90de2fbf0666afa4c7047a9ad
-
SHA1
f77eca56406a6094051da967948255da181a248a
-
SHA256
84ee6f058a2fa6f9a978f1393e1e38cf51d9043a88ab1cedaa17646397d63107
-
SHA512
40a4e8415b28a3e455c7031de31ebfd4edc9bdf277be07b80d87d5b7e474fdb21b3a26380aa3a09d7dc9e4d726ce9710e46e9e89d8560b523d15799034a7bdca
-
SSDEEP
3072:WqRDcqXwZmrw3cd0q+V1+GZ5Lj3+XCFrvi:WkngZmrwMGJ7uOrv
Malware Config
Signatures
Files
-
84ee6f058a2fa6f9a978f1393e1e38cf51d9043a88ab1cedaa17646397d63107.exe windows x86
e39c4b0a1506381929ce344a0aa9d18b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLongPathNameA
SleepEx
IsSystemResumeAutomatic
IsBadHugeWritePtr
GetProcAddress
CreateDirectoryExA
VirtualProtect
DuplicateHandle
CommConfigDialogA
LocalShrink
MoveFileExA
GetTickCount
ReadConsoleA
SetFilePointer
MultiByteToWideChar
CreateFileA
GetSystemDefaultUILanguage
GlobalUnfix
GlobalUnlock
GetLogicalDrives
SetEvent
CreateMutexA
GlobalSize
SetErrorMode
UnmapViewOfFile
GetThreadContext
IsBadReadPtr
WritePrivateProfileSectionA
GetExitCodeProcess
GetEnvironmentVariableA
DeleteAtom
GetFileInformationByHandle
GetCurrentThreadId
Sleep
GetFileAttributesA
IsBadCodePtr
GetProfileStringA
GlobalLock
LocalHandle
FindClose
WideCharToMultiByte
GetFileTime
LocalFlags
RemoveDirectoryA
GetFullPathNameA
MoveFileA
GetProcessVersion
GlobalAddAtomA
WaitForSingleObject
VirtualFreeEx
IsProcessorFeaturePresent
VirtualProtectEx
CreateFileMappingA
BeginUpdateResourceA
HeapFree
IsBadHugeReadPtr
DefineDosDeviceA
GetLargestConsoleWindowSize
SetFileTime
GetModuleFileNameA
WaitForMultipleObjectsEx
PurgeComm
VirtualFree
FlushConsoleInputBuffer
GetCurrentProcess
WritePrivateProfileStringA
WaitNamedPipeA
GlobalFree
AddAtomA
GetCPInfo
CreateDirectoryA
WaitForSingleObjectEx
DisconnectNamedPipe
CallNamedPipeA
GetPrivateProfileStringA
DosDateTimeToFileTime
GetLogicalDriveStringsA
AreFileApisANSI
PulseEvent
CreateWaitableTimerA
LocalUnlock
GetThreadPriorityBoost
LoadResource
UpdateResourceA
GetCPInfoExA
LocalFree
DeviceIoControl
WriteProcessMemory
GetCommMask
QueryDosDeviceA
GetStdHandle
FreeLibrary
GetProcessWorkingSetSize
WriteProfileStringA
LocalReAlloc
GlobalFlags
SetFileAttributesA
GetThreadLocale
LockResource
GetPriorityClass
FreeResource
GetFileType
LockFile
GetProfileSectionA
ClearCommError
VirtualQueryEx
VirtualUnlock
GetPrivateProfileSectionNamesA
GetCurrentProcessId
WaitForMultipleObjects
GetACP
GetPrivateProfileStructA
GetProcessAffinityMask
GetNamedPipeInfo
GlobalWire
PostQueuedCompletionStatus
CreateFiber
OpenMutexA
OpenProcess
CreateMailslotA
GlobalAlloc
IsBadWritePtr
OutputDebugStringA
FoldStringA
GetWindowsDirectoryA
GetModuleHandleA
IsBadStringPtrA
QueryPerformanceCounter
CreateIoCompletionPort
ConnectNamedPipe
GetCurrentThread
CreateRemoteThread
VirtualQuery
GetVolumeInformationA
ResumeThread
CloseHandle
GetCommandLineA
GetStartupInfoA
msvcrt
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE