Static task
static1
Behavioral task
behavioral1
Sample
b717f7dc3d4a0715e8f48d91a16eae8d0d2ef0d8bfe3b924443bf2fb0a6bd47c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b717f7dc3d4a0715e8f48d91a16eae8d0d2ef0d8bfe3b924443bf2fb0a6bd47c.exe
Resource
win10v2004-20220812-en
General
-
Target
b717f7dc3d4a0715e8f48d91a16eae8d0d2ef0d8bfe3b924443bf2fb0a6bd47c
-
Size
127KB
-
MD5
2b953b2b3b1fd44ecf37d3fc5170cae5
-
SHA1
fe72057653dae843f7fe8d11772953b18c2ae7b1
-
SHA256
b717f7dc3d4a0715e8f48d91a16eae8d0d2ef0d8bfe3b924443bf2fb0a6bd47c
-
SHA512
8ae3477e5bcb74df74d0941262567e152491a076db292b995e454bd7304fee01c8ffea4ebc62bc2aeb96d6974206f7774ba55d21bd75f6268cc639a5757bdc11
-
SSDEEP
3072:Rk0IuRjIy9M2hH7pGCtd+UJQ/OKIp7xKKTzoUe+QV4zcXqudw:nI4jI8lVBfQ0x/QU2V4Ild
Malware Config
Signatures
Files
-
b717f7dc3d4a0715e8f48d91a16eae8d0d2ef0d8bfe3b924443bf2fb0a6bd47c.exe windows x86
e76e3a80ba781d91879fdef99b2bb8a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FoldStringA
GetConsoleOutputCP
VirtualAlloc
GlobalAddAtomA
DeleteAtom
DuplicateHandle
GetProcAddress
LoadLibraryExA
GetFileType
GetLogicalDrives
FindClose
GlobalUnWire
SearchPathA
GetStdHandle
GetUserDefaultLangID
GetVersion
GetEnvironmentStrings
GetFileAttributesA
GetPriorityClass
ResumeThread
SizeofResource
GetDiskFreeSpaceA
SleepEx
ClearCommError
ConnectNamedPipe
DefineDosDeviceA
MapViewOfFileEx
IsBadHugeReadPtr
GetUserDefaultUILanguage
WriteProfileStringA
LoadResource
VirtualFree
GetCommConfig
GetNamedPipeHandleStateA
HeapDestroy
PostQueuedCompletionStatus
VirtualProtectEx
LocalHandle
UnlockFile
GetBinaryTypeA
GetThreadContext
CreateEventA
FlushViewOfFile
GetCurrentProcess
LocalShrink
CommConfigDialogA
HeapReAlloc
FindAtomA
CopyFileExA
WriteFile
GetCommTimeouts
SetErrorMode
CallNamedPipeA
AddAtomA
GetCommMask
GetLargestConsoleWindowSize
HeapValidate
VirtualQueryEx
VirtualUnlock
GetPrivateProfileSectionNamesA
GetExitCodeProcess
DeleteFileA
CancelIo
ResetEvent
WaitForSingleObjectEx
GetLocalTime
CreateMailslotA
MapViewOfFile
PeekNamedPipe
IsBadWritePtr
CopyFileA
GlobalFree
GetNamedPipeInfo
MoveFileExA
OutputDebugStringA
UnmapViewOfFile
GetLongPathNameA
GetMailslotInfo
GetProfileStringA
GetLastError
GetProcessHeap
HeapAlloc
WriteProcessMemory
GetWindowsDirectoryA
CreateConsoleScreenBuffer
IsDebuggerPresent
GetProcessHeaps
FreeResource
GetProfileIntA
CreateFiber
QueryDosDeviceA
QueueUserAPC
SetEvent
EndUpdateResourceA
PulseEvent
PeekConsoleInputA
GetPrivateProfileStructA
GetProcessAffinityMask
DeleteFiber
GetSystemDefaultLangID
OpenFileMappingA
HeapCreate
CreateSemaphoreA
GetCommandLineA
ReadProcessMemory
GetVolumeInformationA
ReadConsoleA
GetThreadPriorityBoost
GetDiskFreeSpaceExA
BeginUpdateResourceA
GetCPInfo
LockFile
QueryPerformanceCounter
WaitNamedPipeA
GlobalLock
CreateWaitableTimerA
LocalReAlloc
GetModuleHandleA
GetProcessWorkingSetSize
GetThreadLocale
GlobalFix
GetConsoleCP
CloseHandle
GetACP
SetFileTime
WritePrivateProfileSectionA
GlobalCompact
GetTickCount
EraseTape
WritePrivateProfileStructA
GetCPInfoExA
DeviceIoControl
GetProcessTimes
CreateIoCompletionPort
GetExitCodeThread
MultiByteToWideChar
PurgeComm
IsSystemResumeAutomatic
CreateFileMappingA
GlobalReAlloc
FindCloseChangeNotification
CreateFileA
LockResource
GetStartupInfoA
msvcrt
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE