Static task
static1
Behavioral task
behavioral1
Sample
89f2834114da06f6b857b38c2c07f42dcd9eaba16033547bd4719a4b2d0a8c93.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
89f2834114da06f6b857b38c2c07f42dcd9eaba16033547bd4719a4b2d0a8c93.exe
Resource
win10v2004-20221111-en
General
-
Target
89f2834114da06f6b857b38c2c07f42dcd9eaba16033547bd4719a4b2d0a8c93
-
Size
127KB
-
MD5
8440eb5ef052925a8f9f85df750577e3
-
SHA1
3f82b94b86da56a0782679092dd1515ca3a7efe6
-
SHA256
89f2834114da06f6b857b38c2c07f42dcd9eaba16033547bd4719a4b2d0a8c93
-
SHA512
25432d5fcb102fcd8fc52d41a5a879623054021a03fe93e7ba0654c853e933e69a6fd5f08010184baf6075ebece684ee98a812eab8cab77fcb5ea57c465065d8
-
SSDEEP
3072:TiNZ28H98SUnBolymqLY76dUUWZEwJae4hIigQh11aPa:g48HmClymqLY7nVEwJajh94i
Malware Config
Signatures
Files
-
89f2834114da06f6b857b38c2c07f42dcd9eaba16033547bd4719a4b2d0a8c93.exe windows x86
cf3fc64c05f906cae52b47937058d6d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AllocConsole
CommConfigDialogA
FindClose
SetLastError
GetProcAddress
GetCPInfo
GetPrivateProfileIntA
WriteProcessMemory
AreFileApisANSI
GetLogicalDriveStringsA
GetTickCount
OpenSemaphoreA
GlobalWire
ReadFile
CreateMutexA
GetCommTimeouts
GetCurrentThreadId
GetLastError
GetThreadTimes
HeapValidate
SearchPathA
DeleteFileA
FlushInstructionCache
LocalLock
GetCPInfoExA
UpdateResourceA
LocalSize
PeekNamedPipe
GetLogicalDrives
IsBadHugeReadPtr
GlobalFree
CallNamedPipeA
GetModuleHandleA
FlushViewOfFile
SetEvent
LocalCompact
SetFileTime
DeviceIoControl
GetThreadContext
DeleteFiber
GetDiskFreeSpaceExA
GetFileTime
CreateRemoteThread
VirtualFreeEx
BeginUpdateResourceA
GetFileSize
DefineDosDeviceA
HeapReAlloc
LocalReAlloc
PurgeComm
OpenMutexA
OpenProcess
CreateSemaphoreA
IsProcessorFeaturePresent
VirtualProtect
WideCharToMultiByte
CreateIoCompletionPort
IsBadWritePtr
CreateFileMappingA
GetNamedPipeInfo
GetShortPathNameA
GetUserDefaultLangID
GlobalUnWire
GetWindowsDirectoryA
OpenEventA
CreateEventA
GetLocalTime
CreateConsoleScreenBuffer
GetProcessHeap
GlobalSize
GetPrivateProfileSectionNamesA
VirtualQueryEx
VirtualUnlock
GlobalFindAtomA
GetFileType
GetNamedPipeHandleStateA
ResumeThread
GetCommandLineA
CreateMailslotA
CancelIo
GetMailslotInfo
GetProfileSectionA
OutputDebugStringA
GlobalFlags
MultiByteToWideChar
GetFullPathNameA
LoadResource
EraseTape
FormatMessageA
FreeResource
WriteProfileSectionA
IsDebuggerPresent
GetCommModemStatus
GlobalFix
GetConsoleCP
AddAtomA
ClearCommError
InitAtomTable
CloseHandle
GlobalAlloc
FlushConsoleInputBuffer
ReadProcessMemory
VirtualQuery
MulDiv
CreateDirectoryExA
Sleep
QueryPerformanceCounter
GetProcessHeaps
CreateDirectoryA
MapViewOfFile
WaitForMultipleObjectsEx
IsBadStringPtrA
WaitNamedPipeA
IsValidCodePage
LoadLibraryA
QueryDosDeviceA
WritePrivateProfileSectionA
GlobalLock
WaitForMultipleObjects
CreateFileA
DeleteAtom
LocalFlags
GetProfileIntA
GetTempPathA
GetUserDefaultLCID
FreeConsole
HeapAlloc
PostQueuedCompletionStatus
VirtualLock
CopyFileExA
FreeLibrary
VirtualAllocEx
WriteProfileStringA
SleepEx
SetFilePointer
UnmapViewOfFile
UnlockFile
FindResourceA
GetLargestConsoleWindowSize
GetFileInformationByHandle
LoadLibraryExA
WriteFile
GetCommConfig
ResetEvent
GetVolumeInformationA
FindAtomA
SetFileAttributesA
GetExitCodeThread
PulseEvent
GetCommMask
GetSystemDefaultLangID
GetStartupInfoA
msvcrt
srand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE