Static task
static1
Behavioral task
behavioral1
Sample
630997fc69f9b0a13c5d148648027f416a6c28e4f970b0c67903a67f09cd5ea6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
630997fc69f9b0a13c5d148648027f416a6c28e4f970b0c67903a67f09cd5ea6.exe
Resource
win10v2004-20220812-en
General
-
Target
630997fc69f9b0a13c5d148648027f416a6c28e4f970b0c67903a67f09cd5ea6
-
Size
126KB
-
MD5
0c4d930ade6a4ab25ef0dc1c869dd9d4
-
SHA1
d2e5d6266cf19e86a6c399cad94f8c893ff71b48
-
SHA256
630997fc69f9b0a13c5d148648027f416a6c28e4f970b0c67903a67f09cd5ea6
-
SHA512
d15718a331f22d7ec113ab84a668bf53003a681b75998eff1777db6a6fb4e974f92ef37ca2059e938fadc6e331afcf8da3d994c3399c7a5faac097348551f198
-
SSDEEP
3072:FGPooXiEgfoEE++dUHX/El0MEohBc2/ozqmvAHJkqLI:MfSEgwEVs2MLBc2/oHAy
Malware Config
Signatures
Files
-
630997fc69f9b0a13c5d148648027f416a6c28e4f970b0c67903a67f09cd5ea6.exe windows x86
d7f4db19d2ae274c149843a273eadfda
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetSystemDefaultLCID
CreateSemaphoreA
Beep
FlushInstructionCache
LockFile
GetBinaryTypeA
GetProcAddress
UnmapViewOfFile
LocalFree
HeapCreate
GetCPInfo
CreateWaitableTimerA
GetProcessHeap
GetModuleHandleA
FindResourceA
GetConsoleCP
GetTempPathA
CopyFileExA
FindNextChangeNotification
GetDiskFreeSpaceA
CancelIo
GetSystemDirectoryA
WriteProcessMemory
GetProcessHeaps
BeginUpdateResourceA
GetProfileSectionA
GlobalFindAtomA
GetCPInfoExA
GetCommTimeouts
FormatMessageA
CopyFileA
PeekConsoleInputA
CreateEventA
OutputDebugStringA
GetCurrentThreadId
FindCloseChangeNotification
IsBadHugeReadPtr
GetLongPathNameA
GetFileInformationByHandle
PurgeComm
LocalHandle
IsBadReadPtr
CreateFiber
GetPrivateProfileIntA
QueueUserAPC
GetConsoleOutputCP
ResetEvent
VirtualQuery
LocalReAlloc
CreateFileA
VirtualAlloc
CreateIoCompletionPort
OpenFileMappingA
SetErrorMode
GetLogicalDrives
VirtualAllocEx
DeviceIoControl
WaitForSingleObjectEx
SleepEx
UnlockFile
DuplicateHandle
CreateMailslotA
SetLastError
ReadFile
AddAtomA
LocalLock
GlobalUnWire
CreateMutexA
LockResource
CallNamedPipeA
PostQueuedCompletionStatus
GetProfileStringA
WaitForMultipleObjects
FindClose
GetThreadPriorityBoost
AreFileApisANSI
GetTickCount
MoveFileExA
VirtualProtectEx
GetLogicalDriveStringsA
ReleaseSemaphore
GetVolumeInformationA
GetFileType
WaitForSingleObject
SetFileTime
GetSystemDefaultLangID
GetDriveTypeA
IsDebuggerPresent
ConnectNamedPipe
GetWindowsDirectoryA
GetLastError
AllocConsole
QueryPerformanceCounter
QueryDosDeviceA
IsBadWritePtr
CreateRemoteThread
GetNamedPipeInfo
GetVersion
ContinueDebugEvent
GetCurrentThread
SetFilePointer
IsBadCodePtr
FlushConsoleInputBuffer
FlushViewOfFile
CommConfigDialogA
FindAtomA
GlobalUnfix
GlobalUnlock
GlobalReAlloc
GetUserDefaultUILanguage
SignalObjectAndWait
VirtualLock
GetPrivateProfileSectionNamesA
GetThreadContext
EraseTape
PeekNamedPipe
LoadLibraryExA
IsBadHugeWritePtr
LocalCompact
GetFileSize
ResumeThread
VirtualQueryEx
VirtualUnlock
WaitForMultipleObjectsEx
FoldStringA
VirtualFree
GetCommModemStatus
MapViewOfFile
DeleteFileA
LocalFlags
GetThreadPriority
GetPrivateProfileStructA
GetProcessAffinityMask
GetConsoleCursorInfo
HeapValidate
GetProcessWorkingSetSize
GetCommandLineA
DefineDosDeviceA
PulseEvent
WriteProfileSectionA
FreeConsole
FreeLibrary
IsValidCodePage
LoadLibraryA
VirtualFreeEx
GetStartupInfoA
msvcrt
rand
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE