Static task
static1
Behavioral task
behavioral1
Sample
95001c7e585925134460d3a29b079ea7f26bc92951293294a4549ac33cf0e1cb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
95001c7e585925134460d3a29b079ea7f26bc92951293294a4549ac33cf0e1cb.exe
Resource
win10v2004-20220812-en
General
-
Target
95001c7e585925134460d3a29b079ea7f26bc92951293294a4549ac33cf0e1cb
-
Size
127KB
-
MD5
3eb1650a585780d389748dfd6ea233bd
-
SHA1
9f71965f9784885e94d765a4627f1096dda6d879
-
SHA256
95001c7e585925134460d3a29b079ea7f26bc92951293294a4549ac33cf0e1cb
-
SHA512
bb422727fc7fdb5bd21ce8092ec037b18986379346e6ea00cb7f660b3ad1e69686d44c7834984b1875a42939da51e92c6a6301d08abf60df69b1a9df15b6a2fe
-
SSDEEP
3072:u67umHVL91SV/qYTG6LCOcOk1jylkbiTQt64:uCDH9SViFOcj1jylkbd
Malware Config
Signatures
Files
-
95001c7e585925134460d3a29b079ea7f26bc92951293294a4549ac33cf0e1cb.exe windows x86
02373c710f66ae0a37d760ad5c7742de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetSystemDirectoryA
HeapFree
SizeofResource
GetProcAddress
FoldStringA
FindFirstChangeNotificationA
SetEvent
SetFilePointer
GlobalHandle
LoadResource
FlushInstructionCache
InitAtomTable
CopyFileA
OpenSemaphoreA
HeapCreate
GlobalFree
LocalLock
DefineDosDeviceA
GetVolumeInformationA
GlobalCompact
IsProcessorFeaturePresent
GetFileTime
AreFileApisANSI
ReleaseSemaphore
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetConsoleCP
GetPrivateProfileSectionNamesA
GlobalSize
FindAtomA
FindResourceA
GlobalAddAtomA
GetThreadLocale
GetPrivateProfileStringA
PostQueuedCompletionStatus
CreateWaitableTimerA
GetCommTimeouts
SearchPathA
GlobalWire
GetBinaryTypeA
GetWindowsDirectoryA
GetProcessWorkingSetSize
FormatMessageA
MapViewOfFileEx
CreateMailslotA
IsBadHugeWritePtr
HeapDestroy
GetTickCount
GetProcessVersion
CommConfigDialogA
DeleteFiber
LockFile
CreateConsoleScreenBuffer
GetCommModemStatus
SignalObjectAndWait
IsBadWritePtr
WritePrivateProfileStructA
PulseEvent
CreateSemaphoreA
WaitForMultipleObjectsEx
GetLargestConsoleWindowSize
GetTempPathA
GetUserDefaultUILanguage
GlobalUnfix
GlobalUnlock
CreateFileA
DosDateTimeToFileTime
GetCommMask
GlobalReAlloc
WriteProcessMemory
GlobalFindAtomA
UnmapViewOfFile
GetVersion
CancelWaitableTimer
SleepEx
LocalSize
CreateDirectoryExA
DeleteFileA
UnlockFile
GetLogicalDrives
CreateFiber
GetFileSize
GetCPInfo
GetFileAttributesA
GetLogicalDriveStringsA
GetHandleInformation
PeekNamedPipe
WriteProfileStringA
GetUserDefaultLCID
LocalShrink
HeapReAlloc
VirtualFreeEx
GetCurrentThreadId
SetErrorMode
IsBadStringPtrA
WaitForMultipleObjects
WritePrivateProfileSectionA
CloseHandle
LocalFree
OpenEventA
LocalAlloc
DisconnectNamedPipe
ClearCommError
FindNextChangeNotification
HeapValidate
IsDebuggerPresent
WritePrivateProfileStringA
GetDiskFreeSpaceExA
LocalFlags
VirtualQueryEx
VirtualUnlock
QueryPerformanceCounter
CallNamedPipeA
GetDriveTypeA
GetACP
QueryDosDeviceA
MoveFileA
ReadProcessMemory
GetCurrentThread
GetCommConfig
GetModuleFileNameA
ResumeThread
ResetEvent
ReleaseMutex
PeekConsoleInputA
LocalReAlloc
OpenMutexA
OpenProcess
GetModuleHandleA
GetSystemDefaultLCID
GetCommandLineA
VirtualAllocEx
CreateFileMappingA
CancelIo
GetConsoleOutputCP
GetLongPathNameA
VirtualProtect
GetStdHandle
VirtualFree
GetNamedPipeInfo
GetExitCodeThread
DeviceIoControl
GetCurrentProcess
SetLastError
GetStartupInfoA
msvcrt
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE