Static task
static1
Behavioral task
behavioral1
Sample
d65820ce9c04c12d09c0bbbeedc42647eb6e7bfc9805f16505c62b4becc7fdfc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d65820ce9c04c12d09c0bbbeedc42647eb6e7bfc9805f16505c62b4becc7fdfc.exe
Resource
win10v2004-20220901-en
General
-
Target
d65820ce9c04c12d09c0bbbeedc42647eb6e7bfc9805f16505c62b4becc7fdfc
-
Size
45KB
-
MD5
719795a5b243a08be5dfc9f36476812d
-
SHA1
fa3265ce0bcc726c502d7e4137dafa5a0c23a6f6
-
SHA256
d65820ce9c04c12d09c0bbbeedc42647eb6e7bfc9805f16505c62b4becc7fdfc
-
SHA512
a77a32b6cdfe89a743c2cce67e487dc0705d3b0b9697f09d8dbd852f2e2d4a5cbaeffbc97c837cc01ed33b0ab92c98eb766d2a80e06a5525c170988fbe50d464
-
SSDEEP
768:zYCz83dWuU1g/p685vkbLUVkviRE7VsrCr7SGYhwtEE37NH/tq+rVI6y:fiW6UlbLjf8CrOfitEqNVlVI6y
Malware Config
Signatures
Files
-
d65820ce9c04c12d09c0bbbeedc42647eb6e7bfc9805f16505c62b4becc7fdfc.exe windows x86
84a4d5bf68e62b329a5272a7f393f44b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
TlsFree
CloseHandle
WriteFile
HeapDestroy
IsProcessorFeaturePresent
SetThreadPriority
GetFileAttributesA
QueryPerformanceFrequency
GetFileSize
ReadFile
GetOverlappedResult
InterlockedIncrement
GetModuleFileNameA
lstrlenA
UnmapViewOfFile
FindNextFileA
CreateFileMappingA
IsValidLocale
GetCurrentThread
HeapFree
SetEndOfFile
GetTickCount
GlobalAlloc
DeleteFileA
InitializeCriticalSection
LoadLibraryA
CreateThread
GetExitCodeThread
GlobalFree
MapViewOfFile
ExpandEnvironmentStringsA
VirtualQuery
ReadProcessMemory
GetDriveTypeA
GetVersionExA
DebugBreak
CreateFileA
GetModuleHandleA
RemoveDirectoryA
CreateDirectoryA
TlsAlloc
ResetEvent
WaitForSingleObject
EnterCriticalSection
GetSystemInfo
WaitForSingleObjectEx
GetCurrentProcessId
CreateMutexA
UnhandledExceptionFilter
HeapAlloc
ReadFileEx
FreeLibrary
VirtualFree
VirtualAlloc
ReleaseMutex
LCMapStringW
ReleaseSemaphore
TlsGetValue
GetUserDefaultLangID
SetFilePointer
FindFirstFileA
lstrcpyA
WriteFileEx
GetProcessHeap
CreateSemaphoreA
GetSystemDefaultLangID
OutputDebugStringA
MoveFileA
QueryPerformanceCounter
HeapCreate
FlushFileBuffers
GetCurrentThreadId
SleepEx
GetProcAddress
CopyFileA
FindClose
GetDiskFreeSpaceA
WaitForMultipleObjectsEx
GlobalMemoryStatus
DeleteCriticalSection
SetEvent
GetLocalTime
TlsSetValue
CreateEventA
TerminateProcess
Sleep
GetLastError
GetCurrentProcess
lstrcmpA
winmm
auxSetVolume
advapi32
InitializeSecurityDescriptor
RegSetValueExA
SetSecurityDescriptorDacl
RegQueryValueExA
RegisterEventSourceA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
ReportEventA
DeregisterEventSource
RegCloseKey
RegOpenKeyExA
msvcrt
strncpy
fclose
_strnicmp
swprintf
strtok
malloc
_purecall
_makepath
strchr
_ultoa
__dllonexit
vprintf
printf
_vsnprintf
toupper
fflush
isprint
memmove
free
strtoul
fopen
_beginthread
_snprintf
_adjust_fdiv
vsprintf
_stricmp
rand
atol
_beep
strpbrk
_chdir
exit
_ltoa
_initterm
_except_handler3
sprintf
_iob
_onexit
_itoa
fprintf
_strupr
wcslen
Sections
.textbss Size: 39KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE