Static task
static1
Behavioral task
behavioral1
Sample
85e3ad8f39cfd1c0ed035d1e280f343ccf9d4a0f4f5b1decc915beb63ee309a0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
85e3ad8f39cfd1c0ed035d1e280f343ccf9d4a0f4f5b1decc915beb63ee309a0.exe
Resource
win10v2004-20221111-en
General
-
Target
85e3ad8f39cfd1c0ed035d1e280f343ccf9d4a0f4f5b1decc915beb63ee309a0
-
Size
126KB
-
MD5
810b08d2d44677a92ab9d61851136495
-
SHA1
495479c9211b2a8b393cf97f81553cda00e54228
-
SHA256
85e3ad8f39cfd1c0ed035d1e280f343ccf9d4a0f4f5b1decc915beb63ee309a0
-
SHA512
16056c9a1d36af886a6743d37d6293b12d1d2a2e0f65a4fec9790e53ce03850efba4e849bb432f06a226800bff32e63ad168d97dbf2bb6cf232b84ca4ea29ffc
-
SSDEEP
3072:EUBR8A+bJ+7r+jDZt+wFszhVVKFm5lNwiFoWkYtWvlY6isLsnDRnH4D0q:vRaA6DfpWhVVK05/pOWk4WNWsQnDSD
Malware Config
Signatures
Files
-
85e3ad8f39cfd1c0ed035d1e280f343ccf9d4a0f4f5b1decc915beb63ee309a0.exe windows x86
8f0254df0e3dbea5401d66cdc213261e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
MultiByteToWideChar
GetProcessTimes
MulDiv
CreateMailslotA
GetProcAddress
GetDiskFreeSpaceExA
GlobalSize
DeleteAtom
DeleteFiber
GetModuleHandleA
RemoveDirectoryA
ClearCommBreak
GlobalAddAtomA
GetProfileIntA
GetBinaryTypeA
GetThreadContext
FlushConsoleInputBuffer
DefineDosDeviceA
DisconnectNamedPipe
FormatMessageA
IsBadWritePtr
GetTickCount
Beep
GetExitCodeProcess
HeapCreate
Sleep
WritePrivateProfileStringA
ReadProcessMemory
GetLongPathNameA
SearchPathA
PurgeComm
IsSystemResumeAutomatic
DosDateTimeToFileTime
ReadConsoleA
CreateDirectoryExA
GlobalHandle
GetShortPathNameA
OutputDebugStringA
UnlockFile
GetVersion
UpdateResourceA
PeekConsoleInputA
GetProfileStringA
LoadResource
FoldStringA
BeginUpdateResourceA
EraseTape
CloseHandle
GetProcessHeap
HeapAlloc
WriteProcessMemory
WaitNamedPipeA
PulseEvent
SetEvent
ClearCommError
GlobalCompact
GetOEMCP
PostQueuedCompletionStatus
IsBadCodePtr
CopyFileA
GetThreadTimes
SetErrorMode
ResumeThread
LocalUnlock
GetNamedPipeHandleStateA
DuplicateHandle
ResetEvent
FindAtomA
CancelWaitableTimer
GetFileType
GetCurrentThread
GetHandleInformation
GlobalFindAtomA
CreateSemaphoreA
GetNamedPipeInfo
CreateWaitableTimerA
HeapDestroy
IsBadHugeReadPtr
FreeLibrary
GetSystemDefaultLangID
OpenSemaphoreA
ReleaseMutex
CreateIoCompletionPort
LocalCompact
LocalSize
GetThreadPriorityBoost
GetConsoleCP
VirtualQuery
GetConsoleOutputCP
GetMailslotInfo
GetCommMask
FindFirstChangeNotificationA
HeapValidate
CreateFiber
GetLogicalDrives
GetPriorityClass
IsBadReadPtr
GetModuleFileNameA
WideCharToMultiByte
LocalLock
GlobalLock
InitAtomTable
GetFileAttributesA
FreeConsole
VirtualLock
SetFileTime
LocalShrink
CommConfigDialogA
IsBadHugeWritePtr
GlobalUnfix
GlobalUnlock
GlobalUnWire
QueueUserAPC
AllocConsole
VirtualAlloc
GlobalFlags
CreateConsoleScreenBuffer
GetEnvironmentStrings
FreeResource
CreateRemoteThread
WaitForSingleObjectEx
SignalObjectAndWait
QueryPerformanceCounter
GetDiskFreeSpaceA
VirtualFree
GetCommModemStatus
LocalHandle
GetDriveTypeA
CreateFileA
VirtualAllocEx
SizeofResource
GetCommandLineA
GetCPInfo
GetProfileSectionA
GetThreadSelectorEntry
GetACP
SleepEx
OpenEventA
CancelIo
FindResourceA
CallNamedPipeA
GetCommTimeouts
GetStartupInfoA
msvcrt
rand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE