Static task
static1
Behavioral task
behavioral1
Sample
920efb85c3e10852b646913c3ce83e77dd7410de730a8d81ad593270bada9520.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
920efb85c3e10852b646913c3ce83e77dd7410de730a8d81ad593270bada9520.exe
Resource
win10v2004-20221111-en
General
-
Target
920efb85c3e10852b646913c3ce83e77dd7410de730a8d81ad593270bada9520
-
Size
199KB
-
MD5
3f0d1ab6d1fdcf8e350062de44d8effd
-
SHA1
9c4edde0848eb6073f0da46fa6c7f7e317b35274
-
SHA256
920efb85c3e10852b646913c3ce83e77dd7410de730a8d81ad593270bada9520
-
SHA512
fc0307e90e3ddb1d6e20af64ed32f2ea9a62c23f44d120d5cc3cc46290c40a1bfb56effe6699b0a39871acb195e79b2a55cfe70e61da844871faac2e951759da
-
SSDEEP
6144:dMZol0Y6h7ye4MdBBqdbx4H3napZy2OpA:dMZoH6hee4MdBBqIKZ7b
Malware Config
Signatures
Files
-
920efb85c3e10852b646913c3ce83e77dd7410de730a8d81ad593270bada9520.exe windows x86
e44a1a53d103625a40f60599ebe9f749
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
_CIlog
_CIpow
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
CloseHandle
InitializeCriticalSection
WaitForSingleObject
PeekNamedPipe
HeapAlloc
HeapFree
EnterCriticalSection
HeapReAlloc
LeaveCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
CallWindowProcA
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.cod Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.da Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ