Static task
static1
Behavioral task
behavioral1
Sample
f77b95394aa1dd33aa0fab6871a9cff5d7ca1062e1b3cb3d3a738c00ded164a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f77b95394aa1dd33aa0fab6871a9cff5d7ca1062e1b3cb3d3a738c00ded164a9.exe
Resource
win10v2004-20220812-en
General
-
Target
f77b95394aa1dd33aa0fab6871a9cff5d7ca1062e1b3cb3d3a738c00ded164a9
-
Size
128KB
-
MD5
9e45da3b659bb1e100333a7848cc23bb
-
SHA1
44be2086f2ae2c641f8909352282761023a11475
-
SHA256
f77b95394aa1dd33aa0fab6871a9cff5d7ca1062e1b3cb3d3a738c00ded164a9
-
SHA512
7852f9c18210d4395ac0cd17c1ab4b17756c3ece1b62ec2fb275ebd1929bd015cc6a3baf7e21b21b30aea14217aa09087f9fa093d3f2390069ba26eb2a98c07a
-
SSDEEP
3072:n4td7hdcuTpGIg4iOj0/S6rMoseBf/KSAMOxEPPCZ5M:4DcfMj4/S6FVGESZ5
Malware Config
Signatures
Files
-
f77b95394aa1dd33aa0fab6871a9cff5d7ca1062e1b3cb3d3a738c00ded164a9.exe windows x86
bbab9a21d462692056e97fe7e1df3b1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LocalReAlloc
GetCurrentProcessId
GetHandleInformation
FreeConsole
GetProcAddress
GetProcessHeap
ResetEvent
CreateEventA
CopyFileA
SleepEx
LocalHandle
VirtualAllocEx
GetTickCount
GetMailslotInfo
WaitForMultipleObjectsEx
GetCurrentThread
GetProcessTimes
PeekConsoleInputA
GetShortPathNameA
FindCloseChangeNotification
IsBadReadPtr
SignalObjectAndWait
DeleteAtom
LockResource
GetFileSize
OpenEventA
GlobalReAlloc
GetPrivateProfileStringA
MoveFileExA
ReadFile
AllocConsole
GetLogicalDrives
GlobalHandle
CreateMutexA
UnmapViewOfFile
DosDateTimeToFileTime
GetLongPathNameA
CloseHandle
GlobalWire
PulseEvent
IsValidCodePage
LoadLibraryA
FlushConsoleInputBuffer
ReadConsoleA
ClearCommBreak
IsBadWritePtr
WriteProfileSectionA
HeapValidate
GetDriveTypeA
CommConfigDialogA
WaitForMultipleObjects
GetProcessVersion
GetPrivateProfileIntA
CreateFiber
EraseTape
GetThreadTimes
HeapReAlloc
VirtualLock
SetFileAttributesA
GlobalLock
LocalAlloc
WideCharToMultiByte
GetEnvironmentVariableA
LocalUnlock
GlobalCompact
GetCommMask
GetProfileSectionA
Sleep
GetCommandLineA
GetThreadPriorityBoost
Beep
UnlockFile
FindResourceExA
GetProfileIntA
FreeLibrary
LocalCompact
GetThreadContext
GetThreadLocale
DuplicateHandle
FlushFileBuffers
GlobalUnfix
GlobalUnlock
GetModuleFileNameA
WritePrivateProfileStructA
PostQueuedCompletionStatus
VirtualProtectEx
VirtualAlloc
DisconnectNamedPipe
SizeofResource
LocalShrink
LocalFree
GetExitCodeProcess
ReadProcessMemory
BeginUpdateResourceA
QueryPerformanceCounter
SetErrorMode
GetACP
GetSystemDefaultLangID
IsBadHugeReadPtr
GetConsoleCP
MulDiv
ClearCommError
DeleteFiber
LocalSize
GetModuleHandleA
IsBadHugeWritePtr
GetExitCodeThread
GlobalAddAtomA
PurgeComm
FormatMessageA
GetLastError
LoadLibraryExA
GetPrivateProfileStructA
GetProcessAffinityMask
WriteFile
VirtualFree
CancelWaitableTimer
GlobalFlags
GetLocalTime
WritePrivateProfileSectionA
HeapAlloc
GetOEMCP
LockFile
ReleaseMutex
FlushViewOfFile
SetFilePointer
ConnectNamedPipe
CallNamedPipeA
SetEvent
GetVersion
CreateMailslotA
WaitNamedPipeA
FoldStringA
FindResourceA
OpenFileMappingA
SearchPathA
GetPriorityClass
GetConsoleCursorInfo
SetFileTime
GetCPInfo
GetProfileStringA
MapViewOfFileEx
DeleteFileA
FlushInstructionCache
FindAtomA
CreateFileA
IsBadCodePtr
GetThreadSelectorEntry
WritePrivateProfileStringA
GetNamedPipeInfo
IsSystemResumeAutomatic
GetFullPathNameA
DeviceIoControl
EndUpdateResourceA
CreateDirectoryExA
GetStartupInfoA
msvcrt
srand
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE