Static task
static1
Behavioral task
behavioral1
Sample
e79c8c1bcdc65fb4d14c446dd6b8570ec6b7948db10cfba39b56b0315f832ea7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e79c8c1bcdc65fb4d14c446dd6b8570ec6b7948db10cfba39b56b0315f832ea7.exe
Resource
win10v2004-20220812-en
General
-
Target
e79c8c1bcdc65fb4d14c446dd6b8570ec6b7948db10cfba39b56b0315f832ea7
-
Size
126KB
-
MD5
3b0336c7582e41ad5c216f68413f7a86
-
SHA1
5197e1b4e8c4ae5ff5aa4d777a6035153d48374b
-
SHA256
e79c8c1bcdc65fb4d14c446dd6b8570ec6b7948db10cfba39b56b0315f832ea7
-
SHA512
eaad71db6be285277799de243ffdb7c9d08f1cffcfa39562fe0d4461557fb34400db35c485c23a75e2311865b6782965ea8bc025d19d1838aa78d735b033a7b6
-
SSDEEP
3072:bE6uC2LB6oZcNqJBr+DPUU3A/0nPSo8P0n7olOi:bE6iLBliNoBiTtW0Lt
Malware Config
Signatures
Files
-
e79c8c1bcdc65fb4d14c446dd6b8570ec6b7948db10cfba39b56b0315f832ea7.exe windows x86
d23df5a0a6f2c0be975599f0e13d6ab8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetFileAttributesA
ResumeThread
HeapReAlloc
GetProcAddress
GlobalHandle
IsDebuggerPresent
SetEvent
WaitForMultipleObjectsEx
QueueUserAPC
GetVolumeInformationA
GetNamedPipeInfo
GetDiskFreeSpaceA
CreateDirectoryExA
GlobalFree
OpenEventA
CloseHandle
GetCommTimeouts
GetUserDefaultLCID
GetLogicalDrives
MoveFileExA
VirtualFreeEx
GetOEMCP
GetCurrentProcessId
WaitNamedPipeA
GetCommMask
LoadLibraryExA
CreateDirectoryA
SleepEx
CancelIo
FreeResource
GetSystemDefaultLCID
CommConfigDialogA
FlushConsoleInputBuffer
CreateFileMappingA
GlobalAlloc
LockFile
GetBinaryTypeA
GetLocalTime
IsValidCodePage
LoadLibraryA
GetConsoleCursorInfo
SetErrorMode
DeleteAtom
OpenFileMappingA
FlushViewOfFile
ReadFile
GetConsoleCP
GetTickCount
OpenSemaphoreA
GetNamedPipeHandleStateA
PulseEvent
CreateWaitableTimerA
WriteProcessMemory
GetExitCodeThread
GetLargestConsoleWindowSize
FindFirstChangeNotificationA
ConnectNamedPipe
GetCPInfo
GetProcessHeaps
GetModuleHandleA
VirtualFree
GetSystemDefaultUILanguage
Sleep
BeginUpdateResourceA
VirtualAllocEx
VirtualQueryEx
VirtualUnlock
FlushInstructionCache
IsBadReadPtr
DeviceIoControl
LocalReAlloc
DefineDosDeviceA
PostQueuedCompletionStatus
GetDiskFreeSpaceExA
GlobalSize
SearchPathA
WritePrivateProfileStringA
PeekNamedPipe
GetCurrentThread
FlushFileBuffers
UnlockFile
HeapCreate
WritePrivateProfileSectionA
LocalLock
InitAtomTable
MapViewOfFile
GetThreadPriority
GlobalLock
SizeofResource
QueryDosDeviceA
SetFileAttributesA
GetFileType
DisconnectNamedPipe
CreateSemaphoreA
FreeConsole
VirtualLock
GetProcessVersion
FindCloseChangeNotification
GetConsoleOutputCP
LocalHandle
GetMailslotInfo
GetProfileIntA
GetFileInformationByHandle
SetFilePointer
GetProfileSectionA
GetProcessHeap
HeapAlloc
GetTempPathA
SetFileTime
WaitForSingleObjectEx
GetPrivateProfileStructA
GetProcessAffinityMask
GlobalWire
GetLogicalDriveStringsA
FreeLibrary
GetDriveTypeA
OutputDebugStringA
GetCurrentThreadId
GetFileSize
GlobalUnfix
GlobalUnlock
RemoveDirectoryA
ContinueDebugEvent
GetHandleInformation
UnmapViewOfFile
ResetEvent
LocalAlloc
WideCharToMultiByte
DosDateTimeToFileTime
CreateMailslotA
DeleteFileA
PeekConsoleInputA
ReleaseSemaphore
GetCommModemStatus
FindResourceExA
VirtualProtectEx
GetCommandLineA
GetStartupInfoA
msvcrt
srand
time
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE