Static task
static1
Behavioral task
behavioral1
Sample
4cf64f19e3302388236d23bf655077ffc64d46cf129644538b216f57b31d7bdb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4cf64f19e3302388236d23bf655077ffc64d46cf129644538b216f57b31d7bdb.exe
Resource
win10v2004-20220901-en
General
-
Target
4cf64f19e3302388236d23bf655077ffc64d46cf129644538b216f57b31d7bdb
-
Size
178KB
-
MD5
5332583ccae6f24aa872eccb9429cec0
-
SHA1
5fdf6a201f67f8ef2484c6b0b34ff6e1e20fb6c7
-
SHA256
4cf64f19e3302388236d23bf655077ffc64d46cf129644538b216f57b31d7bdb
-
SHA512
7f7d71f2d867aca9964f364e3976594acdd25417d1dad63765b2b72c10822ae52d833bfcd7344e56af07d956eb27b551fa589ee02046b96e0878a43bc9ef8ab9
-
SSDEEP
3072:m81k7ZQ7B+ceNpqvpfUJkbHzJ4lzJ22kHXM0E8PIpHJRe6HCz3nY51:m81ki7BYiKJwHzJ4lzJD2M5oIpHJRvuA
Malware Config
Signatures
Files
-
4cf64f19e3302388236d23bf655077ffc64d46cf129644538b216f57b31d7bdb.exe windows x86
229a9cb6179e68e8dad2c1f833091244
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
VirtualAlloc
CreateEventA
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetVersionExA
CreateDirectoryA
GetDriveTypeA
RemoveDirectoryA
WriteFile
ReadFile
SetFilePointer
GetLastError
SetLastError
CreateProcessA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileA
GetLocalTime
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
OutputDebugStringA
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
CloseHandle
CreateFileA
ReleaseMutex
SetErrorMode
RaiseException
LocalAlloc
FreeLibrary
GetStartupInfoA
GetModuleHandleA
msvcrt
memcmp
strcpy
strchr
malloc
strcmp
free
_except_handler3
strrchr
rename
strcat
strncmp
atoi
_errno
strtok
strncat
_beginthreadex
??2@YAPAXI@Z
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memset
strstr
strlen
calloc
_ftol
memmove
memcpy
_CxxThrowException
__CxxFrameHandler
??3@YAXPAX@Z
ceil
_strnicmp
_strupr
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hkyn Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE