Static task
static1
Behavioral task
behavioral1
Sample
bc44e97c9630ea011a4a367838219cef8e7682297cf5b4a43933c6b98d99a3f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc44e97c9630ea011a4a367838219cef8e7682297cf5b4a43933c6b98d99a3f7.exe
Resource
win10v2004-20220812-en
General
-
Target
bc44e97c9630ea011a4a367838219cef8e7682297cf5b4a43933c6b98d99a3f7
-
Size
24KB
-
MD5
fc5ebe326f3129671a0655ccb386e03b
-
SHA1
8e3c8c39874df0f90fde1a5338ea5ae71a33c0c2
-
SHA256
bc44e97c9630ea011a4a367838219cef8e7682297cf5b4a43933c6b98d99a3f7
-
SHA512
39080a1b8a9324ff0c3e5420bcacf20f0bdf19c630b7eca993bf163d1288f0de27e5296c5ea579842afe47beac866950b0194554e8ffa6075571d5e1209143e7
-
SSDEEP
384:UoNbUecIldMPz5z2PzUy4Ri2gy+mQGSJV9ebd8osiCZXmkeM:UsbcPNzezJtmQtJV9ebdpshZXF
Malware Config
Signatures
Files
-
bc44e97c9630ea011a4a367838219cef8e7682297cf5b4a43933c6b98d99a3f7.exe windows x86
128663811cd5e983df28a79d2207b1eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
lstrcpyA
GetLastError
GetProcessTimes
GetProcessVersion
LockResource
LoadResource
FindResourceA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
lstrlenA
CreateProcessA
VirtualFreeEx
CloseHandle
VirtualAlloc
VirtualFree
user32
wsprintfA
advapi32
RegQueryValueA
RegOpenKeyA
RegCloseKey
msvcrt
isspace
_splitpath
_except_handler3
strstr
_strlwr
_stricmp
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ