Static task
static1
Behavioral task
behavioral1
Sample
d1b35bb40c3dee5bbc587471518b804ecb8a3df6814c77d6c55b49175985eb06.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d1b35bb40c3dee5bbc587471518b804ecb8a3df6814c77d6c55b49175985eb06.exe
Resource
win10v2004-20220812-en
General
-
Target
d1b35bb40c3dee5bbc587471518b804ecb8a3df6814c77d6c55b49175985eb06
-
Size
96KB
-
MD5
f66fa1fe9fb45a7f1d6a8ddeedf45d3f
-
SHA1
bc6b69b27f723c1fc6a22b91ddd6cb427260d054
-
SHA256
d1b35bb40c3dee5bbc587471518b804ecb8a3df6814c77d6c55b49175985eb06
-
SHA512
4775f01ebf50c0a35d53eb188ce189a102ba9b0d80b957b2eb190ef366575cee958028fe7ea45f14e65a7b98f2737e036bb18e6af1ff4eee14239bad2fe761d1
-
SSDEEP
1536:t8y9g8foEyT0RNRtVB4zC6UaU89PBbozKmmn:t8y9g8fdk0/pNibozZs
Malware Config
Signatures
Files
-
d1b35bb40c3dee5bbc587471518b804ecb8a3df6814c77d6c55b49175985eb06.exe windows x86
89e10377b312d857de7892abed7d1178
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
CreateThread
HeapAlloc
GetProcessHeap
HeapFree
SetLastError
OpenProcess
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetThreadPriority
Process32Next
Process32First
CreateToolhelp32Snapshot
GetComputerNameA
GetSystemDefaultLCID
GetOEMCP
GetACP
GetCPInfo
CreateFileA
GetCurrentProcessId
MultiByteToWideChar
GetModuleFileNameA
GetCurrentThread
GetTempPathA
GetCurrentProcess
FindFirstFileA
GetLastError
FindClose
CloseHandle
SetErrorMode
SetStdHandle
IsBadCodePtr
SetEndOfFile
IsBadReadPtr
LCMapStringW
Sleep
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
user32
GetForegroundWindow
GetWindow
GetMessageA
GetWindowRect
gdi32
GetCurrentObject
advapi32
SetServiceStatus
StartServiceA
ControlService
DeleteService
CreateServiceA
CloseServiceHandle
OpenSCManagerA
OpenProcessToken
shell32
ShellExecuteExW
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ