Static task
static1
Behavioral task
behavioral1
Sample
f25d71e4d964f9d63c8c99b810463ae3499d93c2d98833f7d7e1e73e58a1a11d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f25d71e4d964f9d63c8c99b810463ae3499d93c2d98833f7d7e1e73e58a1a11d.exe
Resource
win10v2004-20220812-en
General
-
Target
f25d71e4d964f9d63c8c99b810463ae3499d93c2d98833f7d7e1e73e58a1a11d
-
Size
127KB
-
MD5
310e96bf3ca7037a10c90f89f020e927
-
SHA1
7409d900a8b729e272071ae83f4ab9cd50799113
-
SHA256
f25d71e4d964f9d63c8c99b810463ae3499d93c2d98833f7d7e1e73e58a1a11d
-
SHA512
d97f8ef35bc5c031bc31bb832b2fe63c93c231c0ff304214e67ee75bfd8558a9515f98da55d8292dcb9def411a16627589f68f73f997df3b23879754175e6d06
-
SSDEEP
3072:R42nby57Nr/smLeDlQjpY2Ec8zzmeA3vQciF/ZdEk:XnbyFNDTLeDWjGpcazmIci9ZdEk
Malware Config
Signatures
Files
-
f25d71e4d964f9d63c8c99b810463ae3499d93c2d98833f7d7e1e73e58a1a11d.exe windows x86
d67801efba6b53a49bf45b5f10cc33d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessVersion
SleepEx
VirtualProtectEx
GetExitCodeProcess
GetProcAddress
GetNamedPipeInfo
GetVolumeInformationA
HeapDestroy
ReleaseMutex
DosDateTimeToFileTime
GetStdHandle
IsBadHugeWritePtr
GetLogicalDrives
FreeConsole
GetConsoleCursorInfo
LocalLock
WriteProcessMemory
GetUserDefaultLangID
GetEnvironmentStrings
GlobalFree
GetCommModemStatus
LocalReAlloc
GlobalSize
GetExitCodeThread
CreateIoCompletionPort
GetLongPathNameA
GlobalReAlloc
GetHandleInformation
VirtualAlloc
VirtualFree
GlobalFix
UpdateResourceA
OpenEventA
LoadLibraryExA
GlobalUnfix
GlobalUnlock
GetThreadLocale
GetTickCount
AddAtomA
FindCloseChangeNotification
GetModuleFileNameA
GlobalWire
OpenFileMappingA
GetACP
LockResource
GetCommConfig
CopyFileExA
FormatMessageA
GetOEMCP
CopyFileA
CreateFiber
GlobalLock
ResetEvent
LocalFree
CommConfigDialogA
WritePrivateProfileStructA
GetWindowsDirectoryA
GetFileSize
ContinueDebugEvent
ClearCommBreak
WaitForMultipleObjects
GetSystemDefaultLCID
DeviceIoControl
GetCurrentProcessId
GetShortPathNameA
GetSystemDefaultUILanguage
PeekConsoleInputA
GetConsoleOutputCP
AllocConsole
CreateRemoteThread
GetConsoleCP
CallNamedPipeA
GetLastError
GetCommandLineA
CreateFileMappingA
QueueUserAPC
VirtualQuery
IsBadCodePtr
SetEvent
GetSystemDirectoryA
Sleep
ReleaseSemaphore
SetLastError
PeekNamedPipe
LocalShrink
AreFileApisANSI
MapViewOfFileEx
DuplicateHandle
WaitForSingleObject
FreeLibrary
FlushViewOfFile
CreateMutexA
CreateMailslotA
GetLocalTime
FindAtomA
QueryDosDeviceA
LocalHandle
GetNamedPipeHandleStateA
OutputDebugStringA
GetFullPathNameA
FindResourceA
VirtualAllocEx
MapViewOfFile
QueryPerformanceCounter
UnmapViewOfFile
GetDriveTypeA
CancelIo
GetUserDefaultLCID
GetFileInformationByHandle
GetPrivateProfileSectionA
SetFilePointer
OpenSemaphoreA
EndUpdateResourceA
FlushFileBuffers
SearchPathA
RemoveDirectoryA
IsDebuggerPresent
WriteProfileStringA
LocalAlloc
MulDiv
ResumeThread
CreateDirectoryExA
WaitForMultipleObjectsEx
HeapFree
GetThreadContext
CloseHandle
IsSystemResumeAutomatic
GetProcessHeaps
BeginUpdateResourceA
GetProcessHeap
FoldStringA
IsBadStringPtrA
GetModuleHandleA
InitAtomTable
GetCPInfoExA
GetCurrentThreadId
HeapValidate
FindNextChangeNotification
GetLargestConsoleWindowSize
ClearCommError
MoveFileExA
PulseEvent
ReadProcessMemory
WaitNamedPipeA
IsBadWritePtr
GetEnvironmentVariableA
GetStartupInfoA
msvcrt
rand
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE