Static task
static1
Behavioral task
behavioral1
Sample
81b8bf9a5688494269146e8e43a6ea15c356189fe5e18fe7e713993d45decb15.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
81b8bf9a5688494269146e8e43a6ea15c356189fe5e18fe7e713993d45decb15.exe
Resource
win10v2004-20221111-en
General
-
Target
81b8bf9a5688494269146e8e43a6ea15c356189fe5e18fe7e713993d45decb15
-
Size
35KB
-
MD5
e9f3d6339d66887f5672d8d4591a6c1a
-
SHA1
af253665773162257956942608f6883b085d3840
-
SHA256
81b8bf9a5688494269146e8e43a6ea15c356189fe5e18fe7e713993d45decb15
-
SHA512
c1f0f3067856079260760583930dc16e5323c3bde6d060cb5a4bcb7181f08d462453664bc090ad605bea3ac9f46f9cb4acda698a6fc88d18a40873800b6ffe2b
-
SSDEEP
384:bCKYZI/3lv2Mql65XwTRk06Nm0fdhWMecJI31DJfr6+Q9SYbmVwGibx:byy/VvnqqXKk0Kfb5QJU+Q9SLVV6
Malware Config
Signatures
Files
-
81b8bf9a5688494269146e8e43a6ea15c356189fe5e18fe7e713993d45decb15.exe windows x86
6335331fbcee1319f8959d569da988fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CommConfigDialogA
ConvertDefaultLocale
CreateDirectoryExA
CreateEventW
CreateHardLinkA
DeleteTimerQueueTimer
EnterCriticalSection
EnumDateFormatsExA
EnumUILanguagesA
FindAtomW
FindFirstVolumeW
FindNextVolumeMountPointW
FindResourceW
FormatMessageW
FreeLibrary
FreeLibraryAndExitThread
FreeResource
GetBinaryTypeW
GetConsoleAliasExesW
GetConsoleCP
GetConsoleTitleA
GetCurrencyFormatA
GetCurrencyFormatW
GetDiskFreeSpaceExA
GetExitCodeProcess
GetNamedPipeHandleStateW
GetNamedPipeInfo
GetOEMCP
GetProcessAffinityMask
GetSystemTime
GetThreadLocale
GetVolumeInformationA
GlobalAddAtomW
GlobalFlags
GlobalGetAtomNameA
HeapCreate
HeapUnlock
LocalHandle
LocalUnlock
LockResource
CancelIo
OpenWaitableTimerA
Process32NextW
PulseEvent
QueueUserWorkItem
ReadConsoleOutputCharacterW
ReadFileScatter
ResetEvent
SetDefaultCommConfigA
SetEvent
SetHandleCount
SetLocaleInfoW
SetStdHandle
SetTapeParameters
SetThreadContext
SetVolumeLabelA
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TransmitCommChar
TryEnterCriticalSection
UnmapViewOfFile
VirtualFreeEx
WaitForSingleObject
WriteFile
WritePrivateProfileStringW
WritePrivateProfileStructW
WriteProfileSectionW
_lopen
lstrcatW
lstrcmpi
lstrcpy
lstrcpyW
lstrlenA
VirtualAlloc
CreateFileA
CreateFileW
LoadLibraryW
GetProcAddress
GetWindowsDirectoryW
GetStartupInfoA
MoveFileExA
CallNamedPipeW
advapi32
RegOpenKeyExA
msvcrt
memcpy
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ