Static task
static1
Behavioral task
behavioral1
Sample
99fceff4f29fdbd65565fdb7f2f6ec261ee514beeef8213b21ed0e2ec61c65cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99fceff4f29fdbd65565fdb7f2f6ec261ee514beeef8213b21ed0e2ec61c65cd.exe
Resource
win10v2004-20220812-en
General
-
Target
99fceff4f29fdbd65565fdb7f2f6ec261ee514beeef8213b21ed0e2ec61c65cd
-
Size
126KB
-
MD5
863d94d42ef3ef32496edade519c0991
-
SHA1
64203fec653f7834d67b76c510ee5dc6bb03d916
-
SHA256
99fceff4f29fdbd65565fdb7f2f6ec261ee514beeef8213b21ed0e2ec61c65cd
-
SHA512
880fd1af914bd46745ac533b977f68a419e84d431032c330049a2b3515eb8c6bcdc5a78b9569c4d7af404b1728457c88cf2861387e1f0c44def639308f28e2e8
-
SSDEEP
3072:wJR3rWnxuXEd7RMsNhttTOdb9ryRscHr:S3AxuuiQPAdb92
Malware Config
Signatures
Files
-
99fceff4f29fdbd65565fdb7f2f6ec261ee514beeef8213b21ed0e2ec61c65cd.exe windows x86
2885996e8cf70609ff7ce6baf8dd9d6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LocalSize
QueryDosDeviceA
GetUserDefaultLangID
ContinueDebugEvent
GetCurrentProcess
GetProcAddress
GetWindowsDirectoryA
LocalShrink
GetSystemDirectoryA
GetCurrentProcessId
FormatMessageA
WaitForSingleObjectEx
FreeConsole
FindResourceA
CreateDirectoryA
GetProfileSectionA
SetFileAttributesA
GlobalUnfix
GlobalUnlock
CreateWaitableTimerA
GetFileSize
RemoveDirectoryA
GetExitCodeProcess
GetCPInfo
GlobalReAlloc
FreeResource
GetEnvironmentVariableA
VirtualQueryEx
VirtualUnlock
VirtualAlloc
GetHandleInformation
GetConsoleCP
GetSystemDefaultLangID
WriteProcessMemory
VirtualProtectEx
FindNextChangeNotification
PurgeComm
GetPrivateProfileIntA
GetLogicalDriveStringsA
GlobalUnWire
VirtualFree
FreeLibrary
PostQueuedCompletionStatus
CreateFileA
GlobalLock
GetProcessHeap
OpenMutexA
OpenProcess
AddAtomA
GetTickCount
LoadLibraryExA
GetFullPathNameA
GetCommMask
MultiByteToWideChar
QueryPerformanceCounter
GetEnvironmentStrings
GetPrivateProfileSectionA
PeekConsoleInputA
GetLastError
GetLocalTime
CreateFiber
IsBadWritePtr
WideCharToMultiByte
GetThreadPriorityBoost
HeapReAlloc
SetEvent
HeapDestroy
SetErrorMode
GetProfileIntA
DeviceIoControl
AllocConsole
GetCommModemStatus
IsBadHugeWritePtr
WriteProfileStringA
GetCurrentThread
GlobalFindAtomA
WaitForMultipleObjectsEx
WriteFile
GetProfileStringA
GetThreadContext
EraseTape
GetVolumeInformationA
GetPriorityClass
SleepEx
GetLongPathNameA
MulDiv
GetProcessHeaps
GlobalAlloc
CommConfigDialogA
LocalLock
DuplicateHandle
MoveFileA
CopyFileExA
LocalCompact
CreateDirectoryExA
LockResource
SetLastError
FlushConsoleInputBuffer
Beep
LocalFlags
OpenFileMappingA
AreFileApisANSI
DefineDosDeviceA
GlobalCompact
GetPrivateProfileStructA
GetProcessAffinityMask
VirtualLock
GetNamedPipeHandleStateA
GetThreadTimes
GetBinaryTypeA
FindAtomA
SizeofResource
DeleteFileA
FlushInstructionCache
GlobalHandle
GetMailslotInfo
GetModuleFileNameA
ReleaseMutex
GetUserDefaultLCID
InitAtomTable
GlobalWire
GetModuleHandleA
GetProcessTimes
GetSystemDefaultUILanguage
GetCommTimeouts
VirtualAllocEx
GetNamedPipeInfo
GetUserDefaultUILanguage
GetConsoleOutputCP
CreateMutexA
GetThreadPriority
IsBadStringPtrA
HeapAlloc
GetProcessWorkingSetSize
GetTempPathA
GlobalFlags
VirtualProtect
ReleaseSemaphore
GetCPInfoExA
SetFilePointer
CallNamedPipeA
CancelIo
UpdateResourceA
IsProcessorFeaturePresent
CreateFileMappingA
GetThreadSelectorEntry
ReadFile
GetCommandLineA
GetStartupInfoA
msvcrt
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE