Static task
static1
Behavioral task
behavioral1
Sample
b1d0b556e661fcfc1a56150086319000477491f51717f46dfdeab647e3f9ad5a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1d0b556e661fcfc1a56150086319000477491f51717f46dfdeab647e3f9ad5a.exe
Resource
win10v2004-20221111-en
General
-
Target
b1d0b556e661fcfc1a56150086319000477491f51717f46dfdeab647e3f9ad5a
-
Size
237KB
-
MD5
1341940b251125066b83ce1b6eefd9d6
-
SHA1
29660db214104b93cbed3da1d6270b75bf1d729f
-
SHA256
b1d0b556e661fcfc1a56150086319000477491f51717f46dfdeab647e3f9ad5a
-
SHA512
3243c00f793d0a8ba5e60876ced26a0900b2dab34a99a9512a21bcd96483d7fefa5dd8bb5facc760105ee52b208dd5e01575635e579be5702e34a98ff6e8b7e4
-
SSDEEP
6144:davmU5iTUdTmDE3dFFFaQVsH2RUruoMDpvhc04F2BphvmXj:davbiSOWdFFMQVLWy9vDhI
Malware Config
Signatures
Files
-
b1d0b556e661fcfc1a56150086319000477491f51717f46dfdeab647e3f9ad5a.exe windows x86
e44a1a53d103625a40f60599ebe9f749
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
_CIlog
_CIpow
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
CloseHandle
InitializeCriticalSection
WaitForSingleObject
PeekNamedPipe
HeapAlloc
HeapFree
EnterCriticalSection
HeapReAlloc
LeaveCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
CallWindowProcA
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.d Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d... Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ