Static task
static1
Behavioral task
behavioral1
Sample
a13c29807c30d937a4157325eb15e1f7a19973c7a2121ff2f9f3f6bb986d119d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a13c29807c30d937a4157325eb15e1f7a19973c7a2121ff2f9f3f6bb986d119d.exe
Resource
win10v2004-20220812-en
General
-
Target
a13c29807c30d937a4157325eb15e1f7a19973c7a2121ff2f9f3f6bb986d119d
-
Size
126KB
-
MD5
356a234bc0eb1fd76fd384723f5c683b
-
SHA1
1d803d4e358fb6ba3ae55d10d5a9324207b89ee1
-
SHA256
a13c29807c30d937a4157325eb15e1f7a19973c7a2121ff2f9f3f6bb986d119d
-
SHA512
9bdb37c62c07150fa237561ce86606f52f83463616a6cc24aa2e8c97e415c75b79db2af7e3fa090c218e61740aab6b65a7754c3e9523d72c1bb731e142775216
-
SSDEEP
3072:YBVOKtHb8hJfI5GBDmbU8mzc3rmK6LuSQDMH:AOKx8Q5Dr8tKiulM
Malware Config
Signatures
Files
-
a13c29807c30d937a4157325eb15e1f7a19973c7a2121ff2f9f3f6bb986d119d.exe windows x86
175125292c4fcc93bf7990736c1eb93a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLogicalDriveStringsA
GetCommModemStatus
VirtualQuery
WaitForSingleObject
OpenEventA
WideCharToMultiByte
GetProcAddress
FlushViewOfFile
GlobalSize
WriteProfileStringA
GetPrivateProfileIntA
OpenSemaphoreA
CreateConsoleScreenBuffer
GetNamedPipeInfo
DisconnectNamedPipe
LockFile
DeviceIoControl
GlobalFix
LoadResource
GetUserDefaultUILanguage
GlobalFree
WaitForMultipleObjectsEx
LocalAlloc
GetPriorityClass
UpdateResourceA
DosDateTimeToFileTime
GetDiskFreeSpaceA
LocalUnlock
FreeResource
IsValidCodePage
LoadLibraryA
GetACP
GetProcessWorkingSetSize
WriteProfileSectionA
IsBadWritePtr
QueryDosDeviceA
ReleaseMutex
IsSystemResumeAutomatic
RemoveDirectoryA
GlobalWire
SetFilePointer
ReadProcessMemory
GlobalUnWire
ResumeThread
GetEnvironmentStrings
GetCPInfoExA
SetLastError
IsBadStringPtrA
FreeConsole
GetThreadPriority
FlushInstructionCache
QueueUserAPC
SearchPathA
FindFirstChangeNotificationA
VirtualProtect
QueryPerformanceCounter
CancelWaitableTimer
GetWindowsDirectoryA
CommConfigDialogA
CloseHandle
GetConsoleCP
GetDriveTypeA
MapViewOfFile
ContinueDebugEvent
GetModuleHandleA
LocalHandle
GlobalFindAtomA
DeleteFiber
GetLargestConsoleWindowSize
WritePrivateProfileSectionA
GetThreadSelectorEntry
SetFileAttributesA
WriteProcessMemory
GetSystemDefaultLCID
GetUserDefaultLangID
CopyFileExA
GetConsoleOutputCP
CancelIo
WritePrivateProfileStringA
CreateMailslotA
GetDiskFreeSpaceExA
IsBadReadPtr
GetCommTimeouts
Sleep
CallNamedPipeA
GetProcessVersion
GetCommandLineA
GetTickCount
WaitNamedPipeA
LocalReAlloc
GetFileAttributesA
GetOEMCP
IsDebuggerPresent
UnmapViewOfFile
GetCurrentProcessId
CreateSemaphoreA
PostQueuedCompletionStatus
ResetEvent
GetThreadPriorityBoost
GetNamedPipeHandleStateA
FlushConsoleInputBuffer
HeapValidate
GetSystemDefaultLangID
PeekConsoleInputA
FindNextChangeNotification
CreateDirectoryExA
GetPrivateProfileSectionA
SignalObjectAndWait
SizeofResource
MulDiv
GetLogicalDrives
MoveFileExA
GetLongPathNameA
GlobalAlloc
HeapReAlloc
ReadFile
GetCurrentThreadId
Beep
GlobalFlags
LocalFree
DefineDosDeviceA
GetPrivateProfileStringA
CreateIoCompletionPort
LocalFlags
IsBadHugeReadPtr
ClearCommError
SetFileTime
CopyFileA
GetHandleInformation
MultiByteToWideChar
GetCommConfig
BeginUpdateResourceA
GetExitCodeProcess
GetProcessTimes
ConnectNamedPipe
GetCommMask
GetExitCodeThread
InitAtomTable
CreateEventA
GetSystemDirectoryA
GetStdHandle
FlushFileBuffers
ClearCommBreak
GetStartupInfoA
msvcrt
rand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE