Static task
static1
Behavioral task
behavioral1
Sample
d1a7a7f62b0a2f8be516373169ab1c39aa57aed7f2bd7f934dee40d49ab4b13c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1a7a7f62b0a2f8be516373169ab1c39aa57aed7f2bd7f934dee40d49ab4b13c.exe
Resource
win10v2004-20220901-en
General
-
Target
d1a7a7f62b0a2f8be516373169ab1c39aa57aed7f2bd7f934dee40d49ab4b13c
-
Size
128KB
-
MD5
4dfac633638f909f74d4b936ebbe366b
-
SHA1
7b944c836172e10491f649cd19a442ff06b52365
-
SHA256
d1a7a7f62b0a2f8be516373169ab1c39aa57aed7f2bd7f934dee40d49ab4b13c
-
SHA512
90b31160ed42ae15d7d33151a73cea37c3242c1983a2b5a1630a1f60845b0f81b88a1d96dfd87adb2bc69e46125bb4a043416980dacb08a04841ea2a1fb17077
-
SSDEEP
3072:F8iNeK0MsW4nCRf3a2RTzmtQdjRcz0vQkBNQJiVBdifTf:FgzMIP2AtQVrZBqi+f
Malware Config
Signatures
Files
-
d1a7a7f62b0a2f8be516373169ab1c39aa57aed7f2bd7f934dee40d49ab4b13c.exe windows x86
7b92fbfbd7a5ead1060ef82e1842f99d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
PeekNamedPipe
EndUpdateResourceA
FindResourceExA
MulDiv
GlobalUnWire
GetConsoleOutputCP
GetProcAddress
GetMailslotInfo
GetLocalTime
MapViewOfFile
Beep
VirtualQueryEx
VirtualUnlock
GetThreadPriority
FindCloseChangeNotification
GlobalAddAtomA
FreeConsole
CreateWaitableTimerA
DeleteFiber
DosDateTimeToFileTime
LocalHandle
CreateIoCompletionPort
IsBadCodePtr
GetFullPathNameA
GetNamedPipeHandleStateA
LocalReAlloc
GetFileTime
GetModuleHandleA
WaitNamedPipeA
GetEnvironmentStrings
OpenSemaphoreA
GetSystemDefaultLCID
FlushInstructionCache
VirtualAllocEx
GetLastError
HeapDestroy
AreFileApisANSI
LocalFree
GetUserDefaultLangID
CreateConsoleScreenBuffer
IsBadHugeWritePtr
GetPrivateProfileStringA
GetStdHandle
GetModuleFileNameA
GetExitCodeThread
EraseTape
ReadProcessMemory
WaitForSingleObjectEx
GetCurrentThread
GlobalReAlloc
PeekConsoleInputA
ReadFile
GlobalFindAtomA
InitAtomTable
CallNamedPipeA
ContinueDebugEvent
FoldStringA
PostQueuedCompletionStatus
GetPrivateProfileIntA
DisconnectNamedPipe
ReleaseMutex
SetFileAttributesA
GetProcessHeap
HeapAlloc
UnlockFile
IsBadReadPtr
CreateRemoteThread
GetTempPathA
GetNamedPipeInfo
QueryDosDeviceA
ReleaseSemaphore
AddAtomA
DeviceIoControl
CancelWaitableTimer
GlobalUnfix
GlobalUnlock
LockResource
GetVolumeInformationA
GlobalFree
GetProcessVersion
GetCPInfo
FreeLibrary
GlobalAlloc
GetDiskFreeSpaceExA
FindNextChangeNotification
OpenMutexA
OpenProcess
LocalCompact
GetCommandLineA
GetProfileStringA
GetThreadContext
CreateFileA
FindFirstChangeNotificationA
IsValidCodePage
LoadLibraryA
WritePrivateProfileSectionA
SleepEx
IsProcessorFeaturePresent
LoadLibraryExA
UnmapViewOfFile
MoveFileExA
GetThreadTimes
HeapValidate
ReadConsoleA
GetLogicalDriveStringsA
GetCommMask
QueryPerformanceCounter
VirtualFree
GetDiskFreeSpaceA
ConnectNamedPipe
GetCommModemStatus
GetPrivateProfileSectionA
LocalUnlock
GetLargestConsoleWindowSize
GetSystemDefaultLangID
GetFileType
CreateSemaphoreA
FindResourceA
GetProcessWorkingSetSize
CopyFileA
GetCommConfig
IsBadHugeReadPtr
GetLogicalDrives
PulseEvent
DefineDosDeviceA
PurgeComm
GetEnvironmentVariableA
CloseHandle
GetThreadLocale
GetHandleInformation
Sleep
LocalSize
VirtualFreeEx
WriteProfileStringA
LockFile
LocalLock
FlushConsoleInputBuffer
WideCharToMultiByte
GetPrivateProfileStructA
GetProcessAffinityMask
WritePrivateProfileStringA
DeleteAtom
GetUserDefaultLCID
GetUserDefaultUILanguage
IsSystemResumeAutomatic
CreateEventA
CreateMutexA
LocalFlags
FlushFileBuffers
GetConsoleCP
CommConfigDialogA
VirtualProtectEx
OpenFileMappingA
WriteFile
GetStartupInfoA
msvcrt
rand
srand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE