Static task
static1
Behavioral task
behavioral1
Sample
777555031b43fea9d8f345d1e6abee2d46858868a58b93b1be39c137904cc618.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
777555031b43fea9d8f345d1e6abee2d46858868a58b93b1be39c137904cc618.exe
Resource
win10v2004-20220812-en
General
-
Target
777555031b43fea9d8f345d1e6abee2d46858868a58b93b1be39c137904cc618
-
Size
126KB
-
MD5
3361490c838d996a0d7f2a73bf5f498d
-
SHA1
91c6bd2cbbced2a0a5e5086243659d434de038e1
-
SHA256
777555031b43fea9d8f345d1e6abee2d46858868a58b93b1be39c137904cc618
-
SHA512
b6c4a1967ee287450dd48dce9d7f4add860791edbd346eeaf019cc332728642b9faeb1793ac50bff7f54225f0ea944c2a7665b450a87b2bef0f8302b8a4f18a4
-
SSDEEP
3072:dFIOaj0Dxg9w5mLY7uR5hJRA08I4IGU0umgLtNnC37:/hn6rnJCG5QWn
Malware Config
Signatures
Files
-
777555031b43fea9d8f345d1e6abee2d46858868a58b93b1be39c137904cc618.exe windows x86
1b8ffa29b07409867c489a6f59c40183
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WritePrivateProfileSectionA
VirtualFree
LocalSize
IsDebuggerPresent
CancelWaitableTimer
GetProcAddress
CommConfigDialogA
GetLogicalDrives
GetMailslotInfo
ReadConsoleA
ConnectNamedPipe
HeapCreate
MapViewOfFileEx
GetFullPathNameA
GetPrivateProfileStringA
GetModuleHandleA
LockResource
GetCommTimeouts
GetProcessHeaps
QueryPerformanceCounter
ContinueDebugEvent
CancelIo
LocalLock
FormatMessageA
MultiByteToWideChar
Sleep
GetPriorityClass
GlobalAlloc
CallNamedPipeA
HeapReAlloc
WritePrivateProfileStructA
GetCommMask
GetCurrentThread
LocalHandle
GetFileAttributesA
PostQueuedCompletionStatus
GlobalFindAtomA
GetPrivateProfileSectionA
FindResourceExA
GetDriveTypeA
GetSystemDirectoryA
FoldStringA
GetLongPathNameA
GetCommConfig
GlobalFix
WaitForMultipleObjects
FlushFileBuffers
GetTickCount
GetProcessTimes
GetCurrentThreadId
GetOEMCP
VirtualLock
VirtualQuery
MoveFileA
GetEnvironmentStrings
WaitForSingleObjectEx
DefineDosDeviceA
GetUserDefaultLangID
GetEnvironmentVariableA
SetErrorMode
CopyFileExA
HeapFree
DosDateTimeToFileTime
CreateSemaphoreA
OpenSemaphoreA
CreateMailslotA
GetDiskFreeSpaceExA
FindResourceA
GetUserDefaultUILanguage
WriteProcessMemory
IsBadHugeWritePtr
HeapValidate
WriteProfileStringA
GetACP
GetHandleInformation
SetFileAttributesA
GetConsoleOutputCP
VirtualQueryEx
VirtualUnlock
GetThreadSelectorEntry
GlobalUnWire
HeapDestroy
LockFile
GetExitCodeThread
EndUpdateResourceA
GetConsoleCP
MapViewOfFile
LocalAlloc
FindFirstChangeNotificationA
FlushConsoleInputBuffer
OutputDebugStringA
UnlockFile
GetPrivateProfileStructA
GetProcessAffinityMask
GetProcessVersion
GetShortPathNameA
IsBadWritePtr
WriteProfileSectionA
GetStdHandle
MulDiv
FindNextChangeNotification
IsSystemResumeAutomatic
LocalUnlock
CloseHandle
ReleaseSemaphore
LocalFlags
SetFileTime
ReadFile
IsBadStringPtrA
ClearCommError
Beep
LocalCompact
GetFileType
GetNamedPipeInfo
SignalObjectAndWait
GetUserDefaultLCID
GlobalCompact
GetCommandLineA
IsProcessorFeaturePresent
UnmapViewOfFile
DeleteFileA
ClearCommBreak
AddAtomA
GetThreadContext
GetLocalTime
CreateFiber
GetExitCodeProcess
GetModuleFileNameA
WritePrivateProfileStringA
LocalFree
GetFileTime
GetSystemDefaultUILanguage
PulseEvent
DeviceIoControl
GetDiskFreeSpaceA
SleepEx
VirtualProtectEx
WriteFile
GetStartupInfoA
msvcrt
time
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE