Static task
static1
Behavioral task
behavioral1
Sample
a02711cc4f993c4ea55a9e537aac305bdb98f870f033721be5dfb2bee01cc5b3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a02711cc4f993c4ea55a9e537aac305bdb98f870f033721be5dfb2bee01cc5b3.exe
Resource
win10v2004-20220901-en
General
-
Target
a02711cc4f993c4ea55a9e537aac305bdb98f870f033721be5dfb2bee01cc5b3
-
Size
127KB
-
MD5
3fbcdeece6b445701254ba7ed7d9cd5f
-
SHA1
bf858cb4358cebf5f613c2fc0a511260fd2cb6b3
-
SHA256
a02711cc4f993c4ea55a9e537aac305bdb98f870f033721be5dfb2bee01cc5b3
-
SHA512
c388013d333abee471ec131117a0cf59a33024d2a9bacc215a5fe2f52a09da0b551900a5a51c194dc3b870d613a413e627a3ec2d788c0716777edcdd1bc4c390
-
SSDEEP
3072:fFnVzawJy5N3rzd52s7S4rUaZmXf7skFBMBiD/qW2WSB1i:TawJ+HS4rUmiIeBMBk/qCSB1
Malware Config
Signatures
Files
-
a02711cc4f993c4ea55a9e537aac305bdb98f870f033721be5dfb2bee01cc5b3.exe windows x86
077490bf4d011171c76379d690f59543
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetSystemDefaultUILanguage
AreFileApisANSI
ResumeThread
GetProfileSectionA
GetProcAddress
GetLongPathNameA
GetCPInfoExA
GetModuleHandleA
OpenFileMappingA
GetVersion
GetEnvironmentVariableA
GlobalAlloc
GetEnvironmentStrings
DeleteFiber
GetVolumeInformationA
IsBadReadPtr
DefineDosDeviceA
DosDateTimeToFileTime
FreeResource
FindResourceA
GetConsoleOutputCP
HeapValidate
SetFilePointer
GlobalAddAtomA
GetPrivateProfileSectionA
VirtualFree
VirtualProtectEx
SetErrorMode
IsValidCodePage
LoadLibraryA
GetCommandLineA
LocalCompact
DuplicateHandle
PurgeComm
ResetEvent
CreateEventA
GetShortPathNameA
GlobalCompact
WritePrivateProfileStructA
SetFileAttributesA
GetLocalTime
GetCurrentProcessId
GlobalWire
LockResource
GetTickCount
SignalObjectAndWait
GetDriveTypeA
FoldStringA
GetHandleInformation
GetThreadTimes
VirtualQueryEx
VirtualUnlock
IsBadStringPtrA
GetFileAttributesA
LocalFree
GetWindowsDirectoryA
CreateFiber
VirtualLock
GetSystemDirectoryA
VirtualQuery
HeapFree
GetCommMask
CommConfigDialogA
WriteProfileStringA
GetFileInformationByHandle
IsBadHugeWritePtr
GetProcessVersion
PeekNamedPipe
CreateDirectoryExA
IsDebuggerPresent
GetUserDefaultLCID
LocalAlloc
CreateWaitableTimerA
GetTempPathA
GetOEMCP
GetPriorityClass
GetThreadSelectorEntry
GlobalFree
CreateMutexA
GetCommTimeouts
GetConsoleCP
GetACP
GetMailslotInfo
LocalReAlloc
GlobalLock
DeleteFileA
WaitForMultipleObjects
GetLastError
GetFullPathNameA
HeapCreate
OpenMutexA
OpenProcess
LocalSize
SetLastError
OutputDebugStringA
IsProcessorFeaturePresent
GetExitCodeThread
FlushInstructionCache
LocalShrink
IsBadWritePtr
AllocConsole
ReadConsoleA
SleepEx
FindNextChangeNotification
ReadProcessMemory
UpdateResourceA
GetProfileIntA
PulseEvent
CreateRemoteThread
Beep
ReadFile
GetUserDefaultLangID
WritePrivateProfileSectionA
GetLargestConsoleWindowSize
CreateMailslotA
CreateIoCompletionPort
IsSystemResumeAutomatic
GetFileSize
MapViewOfFile
IsBadHugeReadPtr
GetCurrentThreadId
UnlockFile
FindFirstChangeNotificationA
ClearCommError
GetBinaryTypeA
CreateFileA
GetStdHandle
QueryDosDeviceA
CancelIo
GlobalFlags
WriteFile
GlobalSize
LocalHandle
LocalUnlock
GetProcessHeap
HeapAlloc
WriteProcessMemory
GetProcessHeaps
RemoveDirectoryA
FlushFileBuffers
GetProcessWorkingSetSize
GetUserDefaultUILanguage
GetPrivateProfileStructA
GetProcessAffinityMask
GetCPInfo
GetNamedPipeHandleStateA
GetPrivateProfileSectionNamesA
GetStartupInfoA
msvcrt
time
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE