Static task
static1
Behavioral task
behavioral1
Sample
7be552dce863c66841fa21bbab8ad08b5b4f0d9ea7404868d44655a14a3da9e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7be552dce863c66841fa21bbab8ad08b5b4f0d9ea7404868d44655a14a3da9e3.exe
Resource
win10v2004-20221111-en
General
-
Target
7be552dce863c66841fa21bbab8ad08b5b4f0d9ea7404868d44655a14a3da9e3
-
Size
127KB
-
MD5
220a9c067460d64ef7946bd5b10263da
-
SHA1
f8f2a9a698145624fd6bdca1304e11d1f7e84565
-
SHA256
7be552dce863c66841fa21bbab8ad08b5b4f0d9ea7404868d44655a14a3da9e3
-
SHA512
7e6f99d145e8275a7d7f5af66c8352877d9669bdda9dff0476dddfdb16342fab61825766639a2d8f8bbb41ec3591a0600aa1bdfd3e6adae49c2454d85680ed19
-
SSDEEP
3072:vuSRfDnNhoqmKqu6/DzcYZ89UCTALXZvfOo:1baWEX
Malware Config
Signatures
Files
-
7be552dce863c66841fa21bbab8ad08b5b4f0d9ea7404868d44655a14a3da9e3.exe windows x86
50e9c65544acd1e8aec0533dfbf751da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProfileIntA
WriteProfileSectionA
GetProcessWorkingSetSize
GetSystemDefaultLCID
IsProcessorFeaturePresent
GetLargestConsoleWindowSize
GetProcAddress
GlobalSize
GlobalUnWire
GetNamedPipeHandleStateA
PostQueuedCompletionStatus
GetFileTime
GetThreadPriority
GetUserDefaultUILanguage
GetEnvironmentVariableA
BeginUpdateResourceA
FindResourceExA
FindClose
GetProcessTimes
LockResource
ReadProcessMemory
ReadFile
UnmapViewOfFile
CreateDirectoryA
CloseHandle
CreateMailslotA
IsBadWritePtr
LocalReAlloc
ConnectNamedPipe
GetModuleFileNameA
CancelWaitableTimer
VirtualFree
GetCommandLineA
MapViewOfFile
DuplicateHandle
CreateFileMappingA
OpenMutexA
OpenProcess
GetEnvironmentStrings
FlushFileBuffers
FreeConsole
OpenFileMappingA
GetVolumeInformationA
FindResourceA
GetHandleInformation
SleepEx
CreateIoCompletionPort
GlobalUnfix
GlobalUnlock
CallNamedPipeA
WritePrivateProfileStringA
GetLocalTime
CreateDirectoryExA
UnlockFile
GetCurrentProcessId
GlobalReAlloc
GetShortPathNameA
SetLastError
LoadLibraryExA
SignalObjectAndWait
GetWindowsDirectoryA
LocalSize
GlobalAlloc
CreateFileA
GetFileSize
HeapReAlloc
MoveFileA
LocalLock
GetCommModemStatus
IsBadCodePtr
IsBadReadPtr
GlobalCompact
GlobalFix
VirtualProtect
PeekConsoleInputA
AddAtomA
GetUserDefaultLCID
DeleteAtom
LocalAlloc
GetExitCodeThread
OpenSemaphoreA
LockFile
SearchPathA
EndUpdateResourceA
CreateEventA
HeapFree
GetDiskFreeSpaceExA
SetFileTime
GetProcessHeaps
ReadConsoleA
GetFullPathNameA
CancelIo
GlobalAddAtomA
Sleep
FindFirstChangeNotificationA
GetThreadTimes
SetErrorMode
GetPrivateProfileSectionA
IsValidCodePage
LoadLibraryA
ReleaseSemaphore
ResetEvent
CopyFileA
VirtualQueryEx
VirtualUnlock
IsDebuggerPresent
GetProcessVersion
LocalCompact
GetTempPathA
GetSystemDirectoryA
MulDiv
GetPrivateProfileSectionNamesA
GetTickCount
GetPrivateProfileStringA
WritePrivateProfileStructA
HeapCreate
QueryPerformanceCounter
WideCharToMultiByte
GlobalFlags
FindAtomA
DefineDosDeviceA
WaitForSingleObjectEx
WritePrivateProfileSectionA
GetCommConfig
VirtualAllocEx
FindCloseChangeNotification
GetSystemDefaultLangID
GetCPInfoExA
GetACP
SizeofResource
GetCurrentThread
GetProcessHeap
HeapAlloc
GetDriveTypeA
GetLongPathNameA
QueryDosDeviceA
GetUserDefaultLangID
FormatMessageA
GetModuleHandleA
GetLogicalDriveStringsA
WaitForMultipleObjectsEx
CommConfigDialogA
GetFileAttributesA
SetEvent
GetProfileSectionA
LocalFlags
VirtualAlloc
GlobalFindAtomA
LocalShrink
GetBinaryTypeA
GetConsoleCursorInfo
OpenEventA
VirtualQuery
GetStartupInfoA
msvcrt
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE