Static task
static1
Behavioral task
behavioral1
Sample
7a74dafdfc125e18c13c450d803cf43470d7fe83de6d3b656d8320476677561c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a74dafdfc125e18c13c450d803cf43470d7fe83de6d3b656d8320476677561c.exe
Resource
win10v2004-20220812-en
General
-
Target
7a74dafdfc125e18c13c450d803cf43470d7fe83de6d3b656d8320476677561c
-
Size
127KB
-
MD5
262a293bc8c76ebea2eb7ac0627f71c9
-
SHA1
ae1faa03e98533bdfb725aafbc1263bb84ce039e
-
SHA256
7a74dafdfc125e18c13c450d803cf43470d7fe83de6d3b656d8320476677561c
-
SHA512
05ae5e22b2954cc5a9d7d87abef9a8802c84638cebe7efd5285910fc9439e784729d3115ba1f10081176a88e17a7d8160732a975108747eda662afcbf8a18898
-
SSDEEP
3072:LFTF5yBmAuHF5IfXFDV2azew7jtSdmYqZJDMFyroeSv3HwT:5FIQl5aFZ1TDMFgoTv
Malware Config
Signatures
Files
-
7a74dafdfc125e18c13c450d803cf43470d7fe83de6d3b656d8320476677561c.exe windows x86
3cd5c7c92544864f0fb4f5d116321723
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
VirtualFreeEx
LockFile
GetHandleInformation
HeapFree
IsValidCodePage
LoadLibraryA
GetPrivateProfileStringA
GetProcAddress
GlobalCompact
GetFileAttributesA
DefineDosDeviceA
GetTickCount
FindResourceA
GetCPInfo
GetDiskFreeSpaceA
LocalLock
WriteProfileStringA
IsSystemResumeAutomatic
FindNextChangeNotification
ConnectNamedPipe
CallNamedPipeA
GetUserDefaultUILanguage
FindResourceExA
DosDateTimeToFileTime
CreateEventA
GetDriveTypeA
OutputDebugStringA
GlobalWire
CreateRemoteThread
GetThreadContext
CreateMutexA
GetPrivateProfileIntA
VirtualLock
DuplicateHandle
FlushFileBuffers
LocalHandle
MapViewOfFileEx
GetFileTime
VirtualQueryEx
VirtualUnlock
ClearCommBreak
CommConfigDialogA
GlobalUnWire
GetLocalTime
LocalFlags
RemoveDirectoryA
GetCurrentProcess
HeapDestroy
PeekNamedPipe
AllocConsole
WideCharToMultiByte
GetProcessHeaps
CancelWaitableTimer
GetFileInformationByHandle
GetCommMask
GlobalLock
GetCommTimeouts
OpenFileMappingA
GlobalFindAtomA
PostQueuedCompletionStatus
OpenEventA
GetMailslotInfo
SetEvent
ContinueDebugEvent
GlobalHandle
GetModuleHandleA
LocalCompact
GetUserDefaultLangID
GetWindowsDirectoryA
OpenSemaphoreA
CancelIo
LocalShrink
QueueUserAPC
DeleteFileA
GetThreadTimes
GetCPInfoExA
GetCurrentThreadId
Beep
GlobalFix
GetFileSize
LoadLibraryExA
CreateDirectoryA
GetLongPathNameA
VirtualQuery
ReleaseSemaphore
GetLogicalDrives
CreateFileMappingA
SearchPathA
GlobalSize
WritePrivateProfileStringA
FindAtomA
SetFileTime
DeleteFiber
ReleaseMutex
HeapCreate
GetACP
GetStdHandle
VirtualProtect
IsBadHugeReadPtr
PurgeComm
VirtualFree
GetProfileIntA
FormatMessageA
FindCloseChangeNotification
CloseHandle
GetPriorityClass
GlobalFlags
ClearCommError
GetPrivateProfileSectionA
GetLastError
GetOEMCP
LocalSize
WriteFile
IsBadWritePtr
SizeofResource
WaitForMultipleObjectsEx
GetConsoleOutputCP
CreateFiber
GetVersion
GetUserDefaultLCID
CopyFileExA
PulseEvent
BeginUpdateResourceA
EndUpdateResourceA
GlobalUnfix
GlobalUnlock
GetSystemDefaultUILanguage
WaitForSingleObject
GetThreadPriority
MultiByteToWideChar
VirtualAlloc
GetConsoleCursorInfo
SignalObjectAndWait
LocalReAlloc
AddAtomA
GetBinaryTypeA
CreateWaitableTimerA
OpenMutexA
OpenProcess
SetFileAttributesA
CreateIoCompletionPort
GetCommModemStatus
EraseTape
GetThreadLocale
MoveFileExA
GetThreadSelectorEntry
IsDebuggerPresent
GetSystemDefaultLangID
GetCommConfig
CreateSemaphoreA
WriteProfileSectionA
GetPrivateProfileStructA
GetProcessAffinityMask
GetExitCodeThread
GetCommandLineA
GetStartupInfoA
msvcrt
rand
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE