Static task
static1
Behavioral task
behavioral1
Sample
742e2c665f3143b7f4535c0f30c91f774a1cfde3c8d2fe36a8c6f0028bf24b62.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
742e2c665f3143b7f4535c0f30c91f774a1cfde3c8d2fe36a8c6f0028bf24b62.exe
Resource
win10v2004-20221111-en
General
-
Target
742e2c665f3143b7f4535c0f30c91f774a1cfde3c8d2fe36a8c6f0028bf24b62
-
Size
126KB
-
MD5
9ffa022bc7d65abad5384b4e75c068f4
-
SHA1
21a56a91ec58c3b69b6caf7047e5b69bb6687bd1
-
SHA256
742e2c665f3143b7f4535c0f30c91f774a1cfde3c8d2fe36a8c6f0028bf24b62
-
SHA512
4021ff6abcc1a3d3801eb477b0ffc1e55b98465c6a5949c150cb8e11af3abe300e499b8e28ec9b36389a103beef24ad3092f81ce0580ec96f23945f1a22ee035
-
SSDEEP
3072:G1W2qRnWkr4BrV70rSmH1lmQ907whKkIXsfgsucRZ:RnWksBJ70TH0wSQ
Malware Config
Signatures
Files
-
742e2c665f3143b7f4535c0f30c91f774a1cfde3c8d2fe36a8c6f0028bf24b62.exe windows x86
2bd329cfde2fd7008db8e09e58a28321
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetShortPathNameA
ReleaseSemaphore
DuplicateHandle
IsValidCodePage
LoadLibraryA
GetProcAddress
Beep
LocalAlloc
WaitForMultipleObjects
LocalShrink
MapViewOfFileEx
GetSystemDefaultLCID
GetUserDefaultUILanguage
GetOEMCP
GetProcessVersion
GetBinaryTypeA
LoadLibraryExA
GetProcessHeap
HeapAlloc
IsDebuggerPresent
GlobalHandle
CallNamedPipeA
GetUserDefaultLCID
ReadProcessMemory
FreeResource
EraseTape
SetErrorMode
GetProcessHeaps
SearchPathA
GetLogicalDrives
GetStdHandle
GlobalUnWire
GetWindowsDirectoryA
FlushConsoleInputBuffer
GlobalFix
LocalHandle
VirtualFreeEx
GetFileTime
GetTickCount
CreateMailslotA
LocalUnlock
WriteProfileStringA
ReadConsoleA
GetDiskFreeSpaceExA
LoadResource
ClearCommError
FlushViewOfFile
IsSystemResumeAutomatic
WritePrivateProfileStringA
PulseEvent
GetLastError
WriteFile
GetThreadSelectorEntry
GetCurrentProcess
GetFileSize
WaitNamedPipeA
CreateIoCompletionPort
MapViewOfFile
UnmapViewOfFile
LocalFree
LocalSize
DefineDosDeviceA
WriteProcessMemory
GetProcessWorkingSetSize
CreateFiber
PurgeComm
SetFileAttributesA
LocalLock
OutputDebugStringA
CancelWaitableTimer
LocalCompact
WaitForSingleObjectEx
GetCPInfo
MultiByteToWideChar
CreateWaitableTimerA
GetCurrentProcessId
GetProfileStringA
FoldStringA
GlobalSize
GetLongPathNameA
HeapCreate
GetThreadTimes
IsBadHugeReadPtr
DosDateTimeToFileTime
PeekNamedPipe
SignalObjectAndWait
GetVolumeInformationA
GetProfileSectionA
GetEnvironmentStrings
CommConfigDialogA
FindClose
UpdateResourceA
GetEnvironmentVariableA
GetThreadContext
HeapFree
GetExitCodeThread
AddAtomA
CreateFileMappingA
HeapReAlloc
IsProcessorFeaturePresent
GlobalReAlloc
MoveFileExA
VirtualAllocEx
GetConsoleCursorInfo
GetLogicalDriveStringsA
IsBadStringPtrA
WritePrivateProfileSectionA
GetPrivateProfileStructA
GetProcessAffinityMask
WaitForSingleObject
ReleaseMutex
QueryPerformanceCounter
SetEvent
QueueUserAPC
GetPrivateProfileSectionA
OpenMutexA
OpenProcess
OpenFileMappingA
PeekConsoleInputA
LocalReAlloc
GetPrivateProfileIntA
BeginUpdateResourceA
FindFirstChangeNotificationA
EndUpdateResourceA
LockFile
GetModuleHandleA
GetNamedPipeHandleStateA
AllocConsole
ResumeThread
PostQueuedCompletionStatus
QueryDosDeviceA
VirtualProtect
GlobalWire
GetSystemDirectoryA
CreateFileA
OpenSemaphoreA
ContinueDebugEvent
IsBadCodePtr
GlobalFindAtomA
GetCommandLineA
GetStartupInfoA
msvcrt
rand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE