Static task
static1
Behavioral task
behavioral1
Sample
8b9d331da7481d3280b9711ccc43b4a31aa35eacfa65b902cb80b6526a07364c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b9d331da7481d3280b9711ccc43b4a31aa35eacfa65b902cb80b6526a07364c.exe
Resource
win10v2004-20221111-en
General
-
Target
8b9d331da7481d3280b9711ccc43b4a31aa35eacfa65b902cb80b6526a07364c
-
Size
236KB
-
MD5
aa8e242602ecddf706d038cb599fc9d3
-
SHA1
c7347241a51339025c94af1761948e902236b1b0
-
SHA256
8b9d331da7481d3280b9711ccc43b4a31aa35eacfa65b902cb80b6526a07364c
-
SHA512
609fc9588e81ffa9b4063a136d12ec72994cf4f8f43ae34d95c208f46f9a501b989b2ed5a26b4c150f109fce922692e698fbe09331e1c077253b5ba2feb95764
-
SSDEEP
3072:yPe3OAmvB1uVXgzuixSJCVG044Gr3pzwdPTMzxhxZgP1NPxQjt0Gdsfe2a:ycmvB41gzuiIJEQ5cPTmx2V01dsm
Malware Config
Signatures
Files
-
8b9d331da7481d3280b9711ccc43b4a31aa35eacfa65b902cb80b6526a07364c.exe windows x86
bf141da9cb28af878e4f410df5faa430
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_wcsnicmp
wcsncmp
wcsncpy
_wcsdup
free
wcscmp
memmove
memcpy
wcslen
kernel32
GetModuleHandleW
HeapCreate
HeapDestroy
ExitProcess
GetTickCount
Sleep
CloseHandle
InitializeCriticalSection
GetModuleFileNameW
GetCommandLineW
HeapAlloc
HeapSize
HeapFree
FreeLibrary
LoadLibraryW
WideCharToMultiByte
GetProcAddress
WriteFile
CreateFileW
GetFileSize
ReadFile
HeapReAlloc
Sections
.code Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 221KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ