Static task
static1
Behavioral task
behavioral1
Sample
850774a99f907109a924e3a532f284ef74c43aa75eda5ac37f91c691963824ca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
850774a99f907109a924e3a532f284ef74c43aa75eda5ac37f91c691963824ca.exe
Resource
win10v2004-20220901-en
General
-
Target
850774a99f907109a924e3a532f284ef74c43aa75eda5ac37f91c691963824ca
-
Size
127KB
-
MD5
8275d97c49b5e9d77ec580bc26175687
-
SHA1
6de8d54cacadaad5079ead8dc4d1dffc4156329f
-
SHA256
850774a99f907109a924e3a532f284ef74c43aa75eda5ac37f91c691963824ca
-
SHA512
dacb3eb6d343d4d4b32857197839932f046384fcbb5ca5fdf06fee2ebe9710712a5eda757a5d5d91f85cf083ada448851097c3210767ae23e71bb45ed46a1e31
-
SSDEEP
3072:9ebJWRZtGFxFD7mKFL7sl+oHCxNM4AVek3I:9tfGFxFP7qLCxNfmek
Malware Config
Signatures
Files
-
850774a99f907109a924e3a532f284ef74c43aa75eda5ac37f91c691963824ca.exe windows x86
e9c335334429f1d892368912ff2c3874
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLastError
LocalHandle
GetModuleHandleA
CreateFileA
GetProcAddress
FindNextChangeNotification
PostQueuedCompletionStatus
VirtualAllocEx
CopyFileExA
CreateConsoleScreenBuffer
GetConsoleCP
GetThreadPriorityBoost
BeginUpdateResourceA
GetUserDefaultLCID
CloseHandle
InitAtomTable
GetLogicalDrives
OpenSemaphoreA
GetThreadLocale
GetUserDefaultUILanguage
GetThreadPriority
MoveFileA
GlobalUnWire
GlobalFindAtomA
GlobalLock
SizeofResource
GetProcessHeaps
SignalObjectAndWait
SetErrorMode
GetNamedPipeInfo
GetCommMask
GetProfileStringA
WaitForSingleObject
GetDiskFreeSpaceExA
GetConsoleCursorInfo
PeekConsoleInputA
HeapCreate
LocalShrink
GetExitCodeThread
VirtualLock
GetProcessTimes
DisconnectNamedPipe
QueryDosDeviceA
FlushFileBuffers
IsBadWritePtr
CommConfigDialogA
GetFileTime
CreateWaitableTimerA
GetVersion
SetEvent
GlobalReAlloc
SetFilePointer
MultiByteToWideChar
GetPrivateProfileIntA
WritePrivateProfileSectionA
FlushInstructionCache
IsDebuggerPresent
ConnectNamedPipe
ClearCommBreak
IsValidCodePage
LoadLibraryA
GetFileInformationByHandle
HeapReAlloc
DosDateTimeToFileTime
GetThreadTimes
GlobalAddAtomA
GetConsoleOutputCP
GetTickCount
VirtualFreeEx
GlobalAlloc
CancelIo
IsBadCodePtr
GetPriorityClass
FindClose
LocalFree
Beep
MapViewOfFile
GlobalUnfix
GlobalUnlock
GetEnvironmentVariableA
GetSystemDirectoryA
FreeResource
AddAtomA
UpdateResourceA
VirtualProtectEx
CallNamedPipeA
GetProcessVersion
GetModuleFileNameA
MoveFileExA
GetEnvironmentStrings
CreateFileMappingA
CreateMailslotA
VirtualProtect
FindResourceExA
GlobalCompact
GetCommModemStatus
ResumeThread
CreateIoCompletionPort
GetProfileIntA
DefineDosDeviceA
QueueUserAPC
GetDiskFreeSpaceA
SetLastError
VirtualFree
LocalFlags
CreateRemoteThread
SearchPathA
PulseEvent
GetPrivateProfileStructA
GetProcessAffinityMask
GetOEMCP
AllocConsole
ClearCommError
GetNamedPipeHandleStateA
IsBadStringPtrA
GetACP
WriteProcessMemory
GetBinaryTypeA
ReadFile
SetFileAttributesA
GetSystemDefaultLCID
LoadResource
FindResourceA
AreFileApisANSI
GetTempPathA
VirtualQuery
DeleteAtom
RemoveDirectoryA
GetProcessWorkingSetSize
GetProcessHeap
HeapAlloc
VirtualAlloc
LocalCompact
GetCPInfoExA
ReleaseMutex
OutputDebugStringA
FreeConsole
HeapDestroy
LocalLock
CreateSemaphoreA
FlushConsoleInputBuffer
GetLocalTime
FreeLibrary
GetCommandLineA
GetStartupInfoA
msvcrt
rand
srand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE