Static task
static1
Behavioral task
behavioral1
Sample
773b211eade5a81f98a297493ca85e3d562873d846665cba4bd3c492c086f449.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
773b211eade5a81f98a297493ca85e3d562873d846665cba4bd3c492c086f449.exe
Resource
win10v2004-20220812-en
General
-
Target
773b211eade5a81f98a297493ca85e3d562873d846665cba4bd3c492c086f449
-
Size
148KB
-
MD5
85ce4b7ee56ce41587e96205c5986240
-
SHA1
96c1a79a0c780f6ad707f76f5da4755f2e87ebcc
-
SHA256
773b211eade5a81f98a297493ca85e3d562873d846665cba4bd3c492c086f449
-
SHA512
e5fdcdc144db4b02b3e15091707b03012db3ab44d2d1a3b7bce457ee41d61a8f1d15a87f522a3329e9fa7f6c38eb51567da4a09a9370c4ae41e5a6eba6dadb58
-
SSDEEP
3072:Y78ZD84aVctVlNb99pjZghztHewqvSU1x9pX:Z44a+tV/b/pSTSnV
Malware Config
Signatures
Files
-
773b211eade5a81f98a297493ca85e3d562873d846665cba4bd3c492c086f449.exe windows x86
a77b2ce618af8ebabae0cbf2be30126e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalAlloc
GetSystemDirectoryA
GetWindowsDirectoryA
GetProcAddress
LoadLibraryA
GetSystemDefaultUILanguage
GlobalMemoryStatusEx
GetVersionExA
lstrcpyA
CloseHandle
GetCurrentProcess
OutputDebugStringA
CreateProcessA
WriteFile
lstrlenA
ExitProcess
DeleteFileA
ReleaseMutex
OpenMutexA
CreateThread
InterlockedExchange
Sleep
WaitForSingleObject
GetLastError
CreateMutexA
GetStartupInfoA
CreateFileA
MoveFileExA
GetModuleFileNameA
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
GetModuleHandleA
ReadFile
GetFileSize
SetFilePointer
GetCurrentProcessId
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
FlushFileBuffers
LCMapStringW
LCMapStringA
SetStdHandle
SetEnvironmentVariableA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetCommandLineA
GetVersion
HeapAlloc
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetEnvironmentVariableA
HeapDestroy
HeapCreate
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
FatalAppExitA
ws2_32
WSASocketA
htonl
sendto
gethostbyname
WSAStartup
htons
socket
connect
closesocket
send
select
__WSAFDIsSet
recv
shutdown
setsockopt
WSAIoctl
inet_addr
shlwapi
PathFileExistsA
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE