Static task
static1
Behavioral task
behavioral1
Sample
be0fa69a5762d849f3aabc37803e74bcdd53069e24180cfd0f56e3c8fa4bf2e9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
be0fa69a5762d849f3aabc37803e74bcdd53069e24180cfd0f56e3c8fa4bf2e9.exe
Resource
win10v2004-20220812-en
General
-
Target
be0fa69a5762d849f3aabc37803e74bcdd53069e24180cfd0f56e3c8fa4bf2e9
-
Size
127KB
-
MD5
77d0bafef8c4b4f53e0d9476a6d395a3
-
SHA1
afa90d316599e8aea458f55bcfcf59e8c0e53e2d
-
SHA256
be0fa69a5762d849f3aabc37803e74bcdd53069e24180cfd0f56e3c8fa4bf2e9
-
SHA512
55513775fa57bda55ff930421e026e7aa9cc7d28d07d63a17732f7edae1945c89a6081e3a9d761fb680e4abf408a05e418501a9a71a7f4768d3301e4bbbed9fb
-
SSDEEP
3072:ifrCseQVtEzV3pf++Jg1avtx3xPOTd0bA0xbtgo+:iYQVti++JfzxFE85go
Malware Config
Signatures
Files
-
be0fa69a5762d849f3aabc37803e74bcdd53069e24180cfd0f56e3c8fa4bf2e9.exe windows x86
876fb61e7d064f20797245979697e7bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
VirtualAlloc
WritePrivateProfileStringA
MoveFileA
GetProcAddress
PeekConsoleInputA
WriteProfileSectionA
GetThreadTimes
GetProcessTimes
FormatMessageA
GetCommModemStatus
VirtualQuery
CommConfigDialogA
WaitForMultipleObjects
ReadProcessMemory
SetEvent
CreateFileA
FlushConsoleInputBuffer
GetCPInfoExA
FlushFileBuffers
PeekNamedPipe
LocalSize
SetFilePointer
WaitForSingleObject
GetCurrentThread
GetPrivateProfileSectionA
FlushInstructionCache
GetProcessWorkingSetSize
GlobalUnWire
CancelWaitableTimer
GetCommMask
GetProfileSectionA
ResetEvent
GetPrivateProfileIntA
GlobalFlags
PurgeComm
CreateSemaphoreA
PostQueuedCompletionStatus
HeapCreate
EraseTape
GetTickCount
GetShortPathNameA
QueryDosDeviceA
WritePrivateProfileSectionA
GetConsoleCursorInfo
Sleep
GetConsoleCP
GlobalLock
ReadFile
VirtualAllocEx
GetThreadContext
GetSystemDefaultUILanguage
GetCPInfo
HeapValidate
DefineDosDeviceA
SetFileTime
GetBinaryTypeA
GetFileAttributesA
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
FindCloseChangeNotification
RemoveDirectoryA
GetProcessHeaps
EndUpdateResourceA
GlobalFix
HeapFree
OpenMutexA
OpenProcess
CreateEventA
GetHandleInformation
CloseHandle
IsDebuggerPresent
OpenEventA
GetLastError
GlobalFree
HeapReAlloc
FlushViewOfFile
InitAtomTable
LocalHandle
WideCharToMultiByte
GlobalHandle
FoldStringA
DeleteFiber
MoveFileExA
SetLastError
ReleaseSemaphore
GlobalReAlloc
CopyFileExA
FindFirstChangeNotificationA
GlobalSize
CreateMailslotA
GetOEMCP
UnlockFile
GlobalAddAtomA
GetACP
GetNamedPipeHandleStateA
GetStdHandle
Beep
GlobalWire
DisconnectNamedPipe
LocalCompact
GetVersion
GetCommandLineA
GlobalCompact
LocalReAlloc
OpenFileMappingA
AddAtomA
GetFileSize
LoadResource
VirtualFreeEx
GetUserDefaultLCID
LocalAlloc
GetTempPathA
ClearCommError
UpdateResourceA
QueueUserAPC
WritePrivateProfileStructA
IsSystemResumeAutomatic
GetFileType
GetEnvironmentStrings
HeapDestroy
GetNamedPipeInfo
GetPrivateProfileSectionNamesA
GetCommConfig
IsBadHugeReadPtr
MapViewOfFileEx
DuplicateHandle
AllocConsole
GlobalUnfix
GlobalUnlock
GetProfileIntA
GetProcessHeap
HeapAlloc
IsBadWritePtr
GetDiskFreeSpaceA
LockResource
GetFileInformationByHandle
GetCurrentThreadId
ContinueDebugEvent
GetThreadSelectorEntry
IsBadCodePtr
GetLongPathNameA
CreateMutexA
GetModuleHandleA
GetProfileStringA
GetThreadPriorityBoost
SearchPathA
VirtualFree
GetConsoleOutputCP
OutputDebugStringA
GetPrivateProfileStringA
GetSystemDefaultLangID
OpenSemaphoreA
IsBadStringPtrA
VirtualProtectEx
GetStartupInfoA
msvcrt
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE