Static task
static1
Behavioral task
behavioral1
Sample
de1c835caf9b09a8c49705650fd7a57ea7cf9a33b2c5f5ea3570985e04dadc16.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
de1c835caf9b09a8c49705650fd7a57ea7cf9a33b2c5f5ea3570985e04dadc16.exe
Resource
win10v2004-20221111-en
General
-
Target
de1c835caf9b09a8c49705650fd7a57ea7cf9a33b2c5f5ea3570985e04dadc16
-
Size
127KB
-
MD5
30816a6e195c06aa6f3f6d292218057f
-
SHA1
7ebb34b407fc41d9abca2f63ce166a041e16649b
-
SHA256
de1c835caf9b09a8c49705650fd7a57ea7cf9a33b2c5f5ea3570985e04dadc16
-
SHA512
74c2fe573f1235c7e056ebd82359003cf5d9206caa7f4ff8b143e313f5f18e64a55a4878b5ab2386f257ac49b1820d835e8edcf22968297edd4182409aa629fd
-
SSDEEP
3072:8gbqRceWH0FP2ZmKfbtizIMoS11np/j76ls5BuXtN3U1cTCfBit:jbq+eDBqZC11p7v5B4T3Wi
Malware Config
Signatures
Files
-
de1c835caf9b09a8c49705650fd7a57ea7cf9a33b2c5f5ea3570985e04dadc16.exe windows x86
70a5a5d7870d76ed7ddcd1edd65e2354
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeviceIoControl
LocalSize
LockResource
IsBadCodePtr
GetProcAddress
GlobalFindAtomA
WideCharToMultiByte
VirtualFree
CreateEventA
GlobalAddAtomA
ConnectNamedPipe
GetUserDefaultLCID
ReleaseSemaphore
BeginUpdateResourceA
GetACP
GetCPInfoExA
IsSystemResumeAutomatic
OutputDebugStringA
CreateWaitableTimerA
GetStdHandle
ReadConsoleA
GetShortPathNameA
VirtualQueryEx
VirtualUnlock
RemoveDirectoryA
GetDiskFreeSpaceExA
GetTickCount
GetLongPathNameA
LocalReAlloc
GetPrivateProfileIntA
IsProcessorFeaturePresent
GetLogicalDriveStringsA
GetLogicalDrives
LocalAlloc
GetPrivateProfileStringA
GetCurrentThreadId
GetThreadPriorityBoost
FindClose
GetCPInfo
GetOEMCP
CloseHandle
HeapValidate
DisconnectNamedPipe
PurgeComm
GetProfileSectionA
FlushConsoleInputBuffer
VirtualProtectEx
MoveFileA
FindCloseChangeNotification
GetUserDefaultUILanguage
IsBadWritePtr
CreateConsoleScreenBuffer
ClearCommError
GetCurrentProcessId
CreateDirectoryExA
LocalUnlock
CallNamedPipeA
AllocConsole
GetHandleInformation
CreateFileA
SetFileTime
FlushInstructionCache
GetCurrentProcess
GlobalWire
GetModuleHandleA
PeekConsoleInputA
WritePrivateProfileSectionA
VirtualAllocEx
VirtualAlloc
AreFileApisANSI
InitAtomTable
GetThreadPriority
GlobalLock
GetSystemDefaultLCID
DeleteAtom
VirtualQuery
SetFileAttributesA
GlobalReAlloc
WaitForMultipleObjectsEx
LockFile
GetLargestConsoleWindowSize
GetProfileStringA
EndUpdateResourceA
LocalLock
LoadResource
GetPrivateProfileSectionA
GetProcessVersion
AddAtomA
GetExitCodeProcess
GetCommandLineA
CreateDirectoryA
HeapFree
CreateFiber
GlobalHandle
GetProcessTimes
ResumeThread
GetMailslotInfo
GetBinaryTypeA
GetSystemDefaultLangID
QueryPerformanceCounter
GlobalCompact
PeekNamedPipe
CreateMutexA
SleepEx
FoldStringA
GetCommMask
MoveFileExA
HeapReAlloc
GetFileType
WriteProfileStringA
ReleaseMutex
FormatMessageA
CreateFileMappingA
GetLocalTime
GetDriveTypeA
IsValidCodePage
LoadLibraryA
CopyFileExA
GetFileInformationByHandle
GetThreadContext
FindResourceA
GetFileTime
MapViewOfFile
ContinueDebugEvent
DeleteFileA
GetEnvironmentVariableA
GetSystemDefaultUILanguage
LocalCompact
Sleep
GetCommModemStatus
GlobalSize
WaitNamedPipeA
GetCurrentThread
FlushViewOfFile
GetPrivateProfileStructA
GetProcessAffinityMask
GlobalFix
ReadProcessMemory
CreateMailslotA
GetProcessHeap
HeapAlloc
SizeofResource
FindResourceExA
GetUserDefaultLangID
HeapCreate
GetStartupInfoA
msvcrt
rand
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE