Static task
static1
Behavioral task
behavioral1
Sample
b04de5694df8aaaa95b5626b8f2e2043e7afa358c13a137a0ed6f24638923482.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b04de5694df8aaaa95b5626b8f2e2043e7afa358c13a137a0ed6f24638923482.exe
Resource
win10v2004-20220812-en
General
-
Target
b04de5694df8aaaa95b5626b8f2e2043e7afa358c13a137a0ed6f24638923482
-
Size
126KB
-
MD5
cb94bfae468406af6ce8b0ed7647d3ec
-
SHA1
6b4fc578a82bf41182d936e88894a13c01017c39
-
SHA256
b04de5694df8aaaa95b5626b8f2e2043e7afa358c13a137a0ed6f24638923482
-
SHA512
b51636af166a8166b56bc6f36099692517df035f9adee67e6d17dca036e9a7f7f41e9f4ebb27c68e80d0b9805e0d7d5b9cfc9c2dbfc0b099a7c27ac43897abca
-
SSDEEP
3072:boi59rlYwr3YsO5KCY6It8208/G1SCK7UffgtXsu:bz9rlz7Yshh6Ix08u1SC3X
Malware Config
Signatures
Files
-
b04de5694df8aaaa95b5626b8f2e2043e7afa358c13a137a0ed6f24638923482.exe windows x86
ddc54c1bd3412aa7c020f743556f2205
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLocalTime
OpenFileMappingA
FlushFileBuffers
GetThreadContext
GlobalFree
GetProcAddress
GetProcessWorkingSetSize
CreateFileMappingA
GetTempPathA
CreateWaitableTimerA
WriteProfileStringA
GetDiskFreeSpaceExA
MoveFileA
GetOEMCP
GetShortPathNameA
WaitForSingleObject
GetProfileStringA
CreateDirectoryA
GetWindowsDirectoryA
PurgeComm
Sleep
SetEvent
DefineDosDeviceA
FoldStringA
CreateMutexA
GetLongPathNameA
OpenEventA
GetNamedPipeInfo
GetFileTime
GetSystemDefaultLangID
LocalCompact
CreateFiber
FindAtomA
CreateMailslotA
GlobalReAlloc
SetFilePointer
GlobalAddAtomA
CreateEventA
FlushViewOfFile
GetConsoleCursorInfo
GetEnvironmentStrings
VirtualQuery
QueueUserAPC
ClearCommError
GetExitCodeProcess
BeginUpdateResourceA
HeapDestroy
GetTickCount
GetCurrentProcess
GetThreadPriorityBoost
GlobalAlloc
WaitForMultipleObjectsEx
FlushInstructionCache
GlobalLock
GetProcessVersion
FreeConsole
GlobalSize
GetSystemDefaultUILanguage
GetStdHandle
LocalFree
GlobalUnWire
PostQueuedCompletionStatus
DeleteAtom
LocalFlags
GetHandleInformation
GetPrivateProfileSectionNamesA
AddAtomA
InitAtomTable
CreateDirectoryExA
WaitForSingleObjectEx
GlobalHandle
GetProcessHeaps
OpenSemaphoreA
SetErrorMode
CreateSemaphoreA
VirtualAlloc
GlobalFlags
WriteProcessMemory
GetCurrentProcessId
GetSystemDirectoryA
FormatMessageA
GetVolumeInformationA
GetNamedPipeHandleStateA
WaitForMultipleObjects
GetProcessHeap
CloseHandle
CancelWaitableTimer
GetCommMask
CopyFileA
PeekNamedPipe
GetCommandLineA
ReadFile
FindResourceA
GetCommTimeouts
EndUpdateResourceA
UnmapViewOfFile
GetConsoleOutputCP
OpenMutexA
OpenProcess
WritePrivateProfileSectionA
GetSystemDefaultLCID
LocalReAlloc
IsBadReadPtr
GetCPInfoExA
LocalLock
QueryDosDeviceA
ClearCommBreak
GetProfileIntA
GetFullPathNameA
VirtualQueryEx
VirtualUnlock
GetCurrentThreadId
MoveFileExA
LocalHandle
SleepEx
GetBinaryTypeA
IsBadCodePtr
CommConfigDialogA
WriteFile
FindFirstChangeNotificationA
PulseEvent
GetFileSize
LockFile
IsBadWritePtr
Beep
FindClose
GetLastError
GetModuleHandleA
GetDriveTypeA
GetProfileSectionA
GetUserDefaultUILanguage
LockResource
SearchPathA
FreeLibrary
MapViewOfFile
ReleaseSemaphore
LocalAlloc
ConnectNamedPipe
UpdateResourceA
UnlockFile
GetThreadSelectorEntry
WaitNamedPipeA
GetStartupInfoA
msvcrt
rand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE