Static task
static1
Behavioral task
behavioral1
Sample
d5f20bf9ce3cd65290a5ebc52e5601a3b85060b9649617b0b22a39b9ab3a681a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d5f20bf9ce3cd65290a5ebc52e5601a3b85060b9649617b0b22a39b9ab3a681a.exe
Resource
win10v2004-20220901-en
General
-
Target
d5f20bf9ce3cd65290a5ebc52e5601a3b85060b9649617b0b22a39b9ab3a681a
-
Size
125KB
-
MD5
2594d8497951e21436e891fbbdade9f0
-
SHA1
40c61ec953c7c98f998a6b3b547d7e427426b0e2
-
SHA256
d5f20bf9ce3cd65290a5ebc52e5601a3b85060b9649617b0b22a39b9ab3a681a
-
SHA512
c8721f1b5c818f819fa25586c59252c8a7eea3fd82dd4594f998f4c330132aaf35776ca5782fc155307abb9d85aa2f8499683170e58d4e6ba33bc547a897c8c6
-
SSDEEP
1536:FaF3Nv7mH5R+75vfVnH3l3ibUtxj8PJzktO4FgnahpY7iWnkg4ncI87IX/KLnHO2:FQ30H5R+F1lj8Kd7pcktn787kGQbEc1
Malware Config
Signatures
Files
-
d5f20bf9ce3cd65290a5ebc52e5601a3b85060b9649617b0b22a39b9ab3a681a.exe windows x86
99dc8bfaa1ba033a6d7301fc69560e75
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
IsBadHugeReadPtr
PeekNamedPipe
CreateDirectoryExA
VirtualFree
PulseEvent
GetProcAddress
GlobalReAlloc
QueueUserAPC
GlobalSize
GetDiskFreeSpaceExA
GlobalCompact
Sleep
GetProfileSectionA
CopyFileExA
GetOEMCP
GetModuleHandleA
VirtualAlloc
ResetEvent
AddAtomA
GetUserDefaultLangID
UnmapViewOfFile
FindNextChangeNotification
ClearCommError
SearchPathA
CreateMailslotA
ConnectNamedPipe
AreFileApisANSI
LocalCompact
GetUserDefaultUILanguage
OpenMutexA
OpenProcess
LocalFree
AllocConsole
WaitNamedPipeA
PurgeComm
IsDebuggerPresent
SizeofResource
CancelIo
GetThreadContext
ReadProcessMemory
GetCommModemStatus
GetHandleInformation
FreeResource
CreateConsoleScreenBuffer
GetSystemDirectoryA
GetThreadLocale
GetDriveTypeA
FreeConsole
GetPriorityClass
GetEnvironmentVariableA
InitAtomTable
GetTickCount
GlobalAddAtomA
OpenSemaphoreA
GetThreadPriority
GetCommConfig
LoadLibraryExA
EndUpdateResourceA
WaitForSingleObject
GlobalWire
MapViewOfFileEx
IsBadWritePtr
GetVolumeInformationA
CreateFiber
MoveFileExA
GetCPInfoExA
FindClose
CopyFileA
GetFileAttributesA
GlobalLock
IsValidCodePage
LoadLibraryA
WritePrivateProfileStringA
SetFileAttributesA
IsProcessorFeaturePresent
VirtualAllocEx
GetPrivateProfileIntA
GetNamedPipeHandleStateA
DeleteFileA
OpenFileMappingA
SetErrorMode
FindFirstChangeNotificationA
IsBadCodePtr
LocalAlloc
HeapDestroy
CreateFileMappingA
FlushInstructionCache
CallNamedPipeA
GetShortPathNameA
SetFileTime
GetThreadPriorityBoost
LocalReAlloc
BeginUpdateResourceA
GetCurrentProcessId
OpenEventA
FlushFileBuffers
MapViewOfFile
HeapFree
DeleteFiber
OutputDebugStringA
SignalObjectAndWait
MoveFileA
GetThreadTimes
GetBinaryTypeA
LocalUnlock
GetConsoleCP
GetEnvironmentStrings
CreateSemaphoreA
GetConsoleCursorInfo
GetCPInfo
SetLastError
DuplicateHandle
Beep
GetWindowsDirectoryA
WriteProfileSectionA
GetVersion
GlobalUnfix
GlobalUnlock
WideCharToMultiByte
GetCurrentThread
GlobalFindAtomA
CreateDirectoryA
LocalHandle
GetExitCodeThread
QueryDosDeviceA
DosDateTimeToFileTime
GetSystemDefaultUILanguage
GetProcessWorkingSetSize
GetCurrentProcess
LocalLock
FoldStringA
GlobalUnWire
GetLocalTime
LocalFlags
VirtualProtectEx
GetProcessVersion
GetCommandLineA
LockResource
IsBadStringPtrA
FormatMessageA
DeleteAtom
GetLongPathNameA
GetFileType
LocalSize
GetCommTimeouts
GetStartupInfoA
msvcrt
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE