Static task
static1
Behavioral task
behavioral1
Sample
644c88af76dd74be400c56e3cc7612e2f4a2ddd55a9c929f55db68b0b4ddd2ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
644c88af76dd74be400c56e3cc7612e2f4a2ddd55a9c929f55db68b0b4ddd2ba.exe
Resource
win10v2004-20220901-en
General
-
Target
644c88af76dd74be400c56e3cc7612e2f4a2ddd55a9c929f55db68b0b4ddd2ba
-
Size
126KB
-
MD5
8080aab1af8c61735c5eaa3b6c67c5a0
-
SHA1
cbaf4d3592e546795a1d299719ed781f28df68e0
-
SHA256
644c88af76dd74be400c56e3cc7612e2f4a2ddd55a9c929f55db68b0b4ddd2ba
-
SHA512
91d726ecfebcfbd648190fa9d45839b6c5c8f3e20bfff32f5c7d0bae9205b2b29eadff537316364cc279851daee2eea4a049778ccd1f74d004968e4cd1abd8f3
-
SSDEEP
3072:9ZcnKgsro5Ttoi11WGaCi+axvksQfAapa7C:vcnKLrcJr11WX+aJU5w
Malware Config
Signatures
Files
-
644c88af76dd74be400c56e3cc7612e2f4a2ddd55a9c929f55db68b0b4ddd2ba.exe windows x86
63ac30696b72ce9092261bc1981937f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DisconnectNamedPipe
GetExitCodeProcess
GetProcAddress
GetLargestConsoleWindowSize
GetUserDefaultLangID
IsProcessorFeaturePresent
GetFileSize
CancelIo
GetProfileSectionA
GetConsoleCP
WriteFile
PeekConsoleInputA
CreateConsoleScreenBuffer
VirtualAlloc
VirtualQuery
VirtualProtectEx
GetPrivateProfileSectionNamesA
GetOEMCP
FreeResource
GetEnvironmentStrings
GetConsoleOutputCP
GetThreadContext
HeapReAlloc
GetHandleInformation
FormatMessageA
IsBadStringPtrA
InitAtomTable
AddAtomA
ReleaseMutex
GetDiskFreeSpaceExA
WaitForSingleObjectEx
VirtualAllocEx
CreateMutexA
FindFirstChangeNotificationA
GlobalFree
GetFileAttributesA
SetFileAttributesA
HeapDestroy
MultiByteToWideChar
IsValidCodePage
LoadLibraryA
FoldStringA
SetFileTime
IsBadWritePtr
ClearCommError
GetSystemDefaultLCID
GetTempPathA
GetDiskFreeSpaceA
AllocConsole
FindResourceA
FlushViewOfFile
SleepEx
GetTickCount
EraseTape
GetExitCodeThread
GetCommConfig
GetThreadPriorityBoost
WriteProfileStringA
GetProfileStringA
Sleep
GetProfileIntA
PurgeComm
GetCommModemStatus
DeviceIoControl
EndUpdateResourceA
GetCPInfo
DefineDosDeviceA
GetProcessHeap
DosDateTimeToFileTime
DeleteFileA
GetLogicalDrives
HeapValidate
GlobalReAlloc
DeleteFiber
MapViewOfFileEx
GetCommTimeouts
GetPriorityClass
GlobalUnWire
SetErrorMode
GetCommandLineA
GetUserDefaultUILanguage
GetLocalTime
CreateEventA
GlobalHandle
PeekNamedPipe
GetThreadTimes
LoadLibraryExA
GetFullPathNameA
IsBadReadPtr
CreateWaitableTimerA
GetThreadLocale
OpenSemaphoreA
ReadConsoleA
GetNamedPipeInfo
GlobalCompact
GetConsoleCursorInfo
GetCPInfoExA
IsSystemResumeAutomatic
FindAtomA
LockFile
ConnectNamedPipe
UnlockFile
RemoveDirectoryA
QueueUserAPC
GetCommMask
GetProcessWorkingSetSize
WritePrivateProfileSectionA
GetCurrentProcess
GlobalWire
WriteProcessMemory
CopyFileExA
GetStdHandle
GetProcessTimes
PulseEvent
ContinueDebugEvent
GetFileType
GlobalFix
FreeConsole
CancelWaitableTimer
ClearCommBreak
CreateFiber
WaitForMultipleObjects
GetFileTime
MoveFileExA
IsBadHugeWritePtr
FlushFileBuffers
CreateFileA
VirtualProtect
LocalFlags
GetLastError
GetCurrentProcessId
GlobalFlags
GetModuleHandleA
CreateIoCompletionPort
OpenFileMappingA
QueryDosDeviceA
GetPrivateProfileIntA
SetFilePointer
GlobalAlloc
LocalLock
VirtualFreeEx
FindClose
GetStartupInfoA
msvcrt
time
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE