Static task
static1
Behavioral task
behavioral1
Sample
07adf47c0c7a35ecfd5e51555f6b66ae7a4d794f88548c43e09a81cae961a8bd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
07adf47c0c7a35ecfd5e51555f6b66ae7a4d794f88548c43e09a81cae961a8bd.exe
Resource
win10v2004-20221111-en
General
-
Target
07adf47c0c7a35ecfd5e51555f6b66ae7a4d794f88548c43e09a81cae961a8bd
-
Size
655KB
-
MD5
50bce9ba70d6529eb7a26ede8d584950
-
SHA1
3929bc52d33e6182b6f6e99e83949ea84987d1c0
-
SHA256
07adf47c0c7a35ecfd5e51555f6b66ae7a4d794f88548c43e09a81cae961a8bd
-
SHA512
ab25cc25fdb4ae227b16278138842b8616cf61e7fe4c72614afcb48f77bfe61ea547b564e25987d8a7896a9968b14909f60d46095d5446594a21504a862db858
-
SSDEEP
1536:1BQZjlDtdDkM0ncL79l1wUEkWLj3uWHmdmLoys5IJ+I7KyALeoIk0lYUTPj68:eJtdYEf9REkwjjSQs5IUI7GCoI/lLn
Malware Config
Signatures
Files
-
07adf47c0c7a35ecfd5e51555f6b66ae7a4d794f88548c43e09a81cae961a8bd.exe windows x86
841e93643d1ffea7d0131627dc5a4b39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
CompareStringA
CreateProcessA
EnumResourceLanguagesW
FindNextVolumeA
FreeLibrary
GetModuleFileNameA
GetShortPathNameA
GetTempFileNameA
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalReAlloc
GlobalUnlock
InterlockedDecrement
LocalFree
MoveFileExA
MulDiv
MultiByteToWideChar
OpenSemaphoreA
OutputDebugStringA
OutputDebugStringW
ReadConsoleOutputAttribute
SetConsoleTitleA
VirtualQueryEx
WaitForSingleObject
WideCharToMultiByte
WritePrivateProfileStringA
WritePrivateProfileStructA
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetLastError
CloseHandle
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapFree
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
SetLastError
GetCurrentThreadId
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
SetStdHandle
GetACP
GetOEMCP
GetCPInfo
CompareStringW
InitializeCriticalSection
HeapAlloc
RtlUnwind
HeapReAlloc
HeapSize
InterlockedExchange
VirtualQuery
IsBadWritePtr
LoadLibraryA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
SetFilePointer
ReadFile
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FlushFileBuffers
GetExitCodeProcess
CreateProcessW
GetFileAttributesW
GetTimeZoneInformation
SetEnvironmentVariableA
SetEnvironmentVariableW
GetLocaleInfoW
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 444KB - Virtual size: 452KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE