Static task
static1
Behavioral task
behavioral1
Sample
14c8e4e2d71b113c8fdda6a2ae13764cf8a8697265246a8d0eebd4c31802c0f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14c8e4e2d71b113c8fdda6a2ae13764cf8a8697265246a8d0eebd4c31802c0f1.exe
Resource
win10v2004-20220812-en
General
-
Target
14c8e4e2d71b113c8fdda6a2ae13764cf8a8697265246a8d0eebd4c31802c0f1
-
Size
59KB
-
MD5
bc5a4031db9949aed52e388493883c4e
-
SHA1
1c34a37ebb8e500fad40d9661a24baa4c2cfd226
-
SHA256
14c8e4e2d71b113c8fdda6a2ae13764cf8a8697265246a8d0eebd4c31802c0f1
-
SHA512
d16fef75316443310d6fa672993fbf82d60b64e14207b1086c09f4e8585f0f7d492248159681961f38bbd47d102db7e1392f56907e8468b48741c9bcf2129501
-
SSDEEP
1536:pqMmvetdhTi7ebaUJNpUutpMYUY/vWVrELCG:pqM8e/hKcWutpMYUY/tLC
Malware Config
Signatures
Files
-
14c8e4e2d71b113c8fdda6a2ae13764cf8a8697265246a8d0eebd4c31802c0f1.exe windows x86
fe21c41137682cb77aa4e1f81ee31b06
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMailslotA
GetStdHandle
GetVolumePathNameA
Sleep
SetLastError
lstrcmpiA
HeapCreate
lstrcmpiA
SuspendThread
GetModuleFileNameA
GetModuleHandleA
DeleteFileA
WaitForSingleObject
IsValidLocale
lstrcmpiA
GetProcessHeap
lstrlenA
GetLogicalDriveStringsA
FileTimeToLocalFileTime
CreateNamedPipeA
lstrcmpiA
lstrcmpiA
GetDriveTypeW
riched20
IID_ITextHost
CreateTextServices
RichEditANSIWndProc
IID_IRichEditOle
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sql Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ