Static task
static1
Behavioral task
behavioral1
Sample
67396162a6b99b24fabb5dbccdc90e45e1119f27e1d0bc6b6f9fa4934f2fab57.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67396162a6b99b24fabb5dbccdc90e45e1119f27e1d0bc6b6f9fa4934f2fab57.exe
Resource
win10v2004-20220901-en
General
-
Target
67396162a6b99b24fabb5dbccdc90e45e1119f27e1d0bc6b6f9fa4934f2fab57
-
Size
126KB
-
MD5
ba73d918b93117b8d306fc2197b318a1
-
SHA1
15fc6cb09c86bdbd34e37260769b77c6959cdbd7
-
SHA256
67396162a6b99b24fabb5dbccdc90e45e1119f27e1d0bc6b6f9fa4934f2fab57
-
SHA512
5fca413198bbcc041b05e89377e8a6a6632d7ad74f251e6487a81206c9a76b40789a2f11d2f195cd9852ff66178ddb7d3f5967b79d9b4a497df2882c9168773e
-
SSDEEP
3072:WX3llRlIMOBov3Ro6pesWxe2v47ukGE+gNx1+Xew:e3DRGMOev3Ro6p0POJVN6
Malware Config
Signatures
Files
-
67396162a6b99b24fabb5dbccdc90e45e1119f27e1d0bc6b6f9fa4934f2fab57.exe windows x86
c65c76125db00de8fb5fe534bd56f839
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
IsBadStringPtrA
GetPrivateProfileStringA
GetModuleFileNameA
RemoveDirectoryA
GetThreadSelectorEntry
CreateWaitableTimerA
GetProcAddress
WaitNamedPipeA
LockFile
CreateIoCompletionPort
LocalHandle
GetVersion
ReadProcessMemory
WriteProcessMemory
GlobalHandle
DefineDosDeviceA
GetSystemDirectoryA
CreateMailslotA
VirtualProtect
VirtualQuery
GetDiskFreeSpaceA
IsBadWritePtr
GetUserDefaultLangID
MultiByteToWideChar
IsProcessorFeaturePresent
PeekConsoleInputA
WritePrivateProfileStringA
GetUserDefaultLCID
GetCommConfig
CopyFileA
WaitForSingleObject
GetPrivateProfileSectionA
FlushViewOfFile
GetTickCount
GetLogicalDrives
GlobalFix
WritePrivateProfileStructA
GetProcessTimes
OpenFileMappingA
GlobalReAlloc
IsSystemResumeAutomatic
WideCharToMultiByte
GlobalAddAtomA
GetCPInfo
GetVolumeInformationA
SetFilePointer
CreateFileMappingA
GetDiskFreeSpaceExA
GetExitCodeThread
ReadConsoleA
IsDebuggerPresent
GetSystemDefaultLangID
AreFileApisANSI
IsBadHugeReadPtr
GetProcessVersion
GetThreadLocale
GetProcessHeaps
LocalLock
GetConsoleOutputCP
LocalShrink
FlushInstructionCache
Sleep
GetProfileSectionA
GetThreadTimes
GetMailslotInfo
WritePrivateProfileSectionA
MoveFileA
CopyFileExA
GetSystemDefaultLCID
GetThreadPriorityBoost
GetNamedPipeHandleStateA
GetProfileStringA
MulDiv
GetFileAttributesA
WaitForMultipleObjectsEx
VirtualAllocEx
GetPriorityClass
GlobalFree
HeapDestroy
OpenMutexA
OpenProcess
EraseTape
AddAtomA
DeleteFiber
FoldStringA
ConnectNamedPipe
FreeResource
PeekNamedPipe
GlobalUnfix
GlobalUnlock
Beep
GetCommModemStatus
GetOEMCP
IsBadCodePtr
UnmapViewOfFile
CloseHandle
GetProcessHeap
SetErrorMode
VirtualAlloc
InitAtomTable
GetFileInformationByHandle
CreateFileA
DeleteFileA
CancelWaitableTimer
ReadFile
GetShortPathNameA
BeginUpdateResourceA
GetEnvironmentVariableA
LocalSize
IsBadHugeWritePtr
LocalCompact
CancelIo
GlobalSize
GlobalAlloc
GetBinaryTypeA
GetConsoleCP
AllocConsole
GetCurrentThread
GetUserDefaultUILanguage
VirtualQueryEx
VirtualUnlock
VirtualProtectEx
HeapFree
CreateEventA
GetFileType
GetExitCodeProcess
FindResourceA
GetCurrentThreadId
LoadResource
GetModuleHandleA
LocalReAlloc
SetFileTime
LocalFlags
SleepEx
GetCPInfoExA
LockResource
SetLastError
GetCurrentProcess
GetCommandLineA
GetStartupInfoA
msvcrt
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE