Static task
static1
Behavioral task
behavioral1
Sample
b03644c99d5ccb4bf37b8d179e2dfb123e4c01ee8559dc4ca0a85be00bb54a99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b03644c99d5ccb4bf37b8d179e2dfb123e4c01ee8559dc4ca0a85be00bb54a99.exe
Resource
win10v2004-20220812-en
General
-
Target
b03644c99d5ccb4bf37b8d179e2dfb123e4c01ee8559dc4ca0a85be00bb54a99
-
Size
128KB
-
MD5
18d690b890e1ea47a7c3ae9534dc8412
-
SHA1
e50b7cae585b06583da393198adbf0b4df74609f
-
SHA256
b03644c99d5ccb4bf37b8d179e2dfb123e4c01ee8559dc4ca0a85be00bb54a99
-
SHA512
6fe0c08489fa03f0ac34debfe0d6cdd41462eec513bab66eb2958e5388e27ef42edb5ef68566227683218bd1d8cfaf7c61a65e2b0666b25a3e2ce162764fb442
-
SSDEEP
3072:d7hdcuTpGIg4iOj0/S6rMoseBf/KSAMOxEPPCcufaiA:RcfMj4/S6FVGEScufa
Malware Config
Signatures
Files
-
b03644c99d5ccb4bf37b8d179e2dfb123e4c01ee8559dc4ca0a85be00bb54a99.exe windows x86
c29552cca629b8be6f76572404baceef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ContinueDebugEvent
GetThreadContext
FindFirstChangeNotificationA
GetDriveTypeA
WritePrivateProfileSectionA
SetFilePointer
GetProcAddress
FindClose
HeapReAlloc
GetThreadSelectorEntry
GetProcessTimes
VirtualLock
WaitNamedPipeA
LockResource
FreeLibrary
LoadResource
WritePrivateProfileStructA
GetTempPathA
GetCurrentThread
CopyFileA
GlobalAddAtomA
SetEvent
GetBinaryTypeA
FlushInstructionCache
GetCurrentThreadId
IsBadWritePtr
LockFile
GetFileSize
GetLogicalDrives
GlobalFlags
SetLastError
MoveFileA
GlobalWire
SignalObjectAndWait
GetThreadLocale
VirtualQuery
LocalUnlock
PeekNamedPipe
FlushConsoleInputBuffer
GetTickCount
SizeofResource
GlobalAlloc
CreateConsoleScreenBuffer
UnmapViewOfFile
DefineDosDeviceA
LocalShrink
SetFileTime
GetProcessWorkingSetSize
OpenEventA
IsValidCodePage
LoadLibraryA
FreeConsole
FindResourceExA
DeleteFiber
WriteProfileStringA
IsBadStringPtrA
GetConsoleCursorInfo
WaitForMultipleObjectsEx
GetSystemDefaultLangID
ClearCommError
GetCurrentProcess
CreateEventA
GlobalHandle
ResetEvent
GlobalSize
GlobalUnfix
GlobalUnlock
OpenFileMappingA
IsBadReadPtr
EndUpdateResourceA
GetProfileStringA
AllocConsole
FreeResource
GetSystemDirectoryA
GetConsoleOutputCP
WaitForMultipleObjects
GetThreadPriorityBoost
GetFileAttributesA
GetProcessHeap
HeapAlloc
SetFileAttributesA
BeginUpdateResourceA
QueueUserAPC
MapViewOfFileEx
CancelWaitableTimer
OpenSemaphoreA
CallNamedPipeA
EraseTape
HeapValidate
GetUserDefaultUILanguage
OpenMutexA
OpenProcess
VirtualFreeEx
SetErrorMode
CreateFileA
MulDiv
GetNamedPipeHandleStateA
GetPrivateProfileStructA
GetProcessAffinityMask
PurgeComm
WriteFile
GetOEMCP
MapViewOfFile
CreateWaitableTimerA
FlushFileBuffers
GetUserDefaultLangID
GetDiskFreeSpaceExA
GetWindowsDirectoryA
LocalCompact
GetThreadPriority
GetShortPathNameA
CreateRemoteThread
FindResourceA
IsSystemResumeAutomatic
FindNextChangeNotification
VirtualProtect
GetProcessHeaps
GetPrivateProfileIntA
GetLargestConsoleWindowSize
Sleep
IsBadHugeWritePtr
GetCurrentProcessId
GlobalCompact
GetVolumeInformationA
AreFileApisANSI
OutputDebugStringA
IsDebuggerPresent
CreateFiber
LoadLibraryExA
GetLongPathNameA
LocalLock
CopyFileExA
HeapCreate
CancelIo
DosDateTimeToFileTime
WritePrivateProfileStringA
FindAtomA
UpdateResourceA
CreateDirectoryExA
InitAtomTable
DeviceIoControl
GetCommTimeouts
SleepEx
GetModuleHandleA
GetACP
GetUserDefaultLCID
HeapFree
GetCommConfig
GetFullPathNameA
CreateFileMappingA
GlobalFree
ResumeThread
WaitForSingleObject
GetFileInformationByHandle
GetEnvironmentStrings
CommConfigDialogA
GetCommModemStatus
GetCommandLineA
GetStartupInfoA
msvcrt
rand
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE