Static task
static1
Behavioral task
behavioral1
Sample
b71e2977cbbd1b7ae29a261e40307dadfcccf947818819e6cb91d4091d37db9c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b71e2977cbbd1b7ae29a261e40307dadfcccf947818819e6cb91d4091d37db9c.exe
Resource
win10v2004-20220812-en
General
-
Target
b71e2977cbbd1b7ae29a261e40307dadfcccf947818819e6cb91d4091d37db9c
-
Size
168KB
-
MD5
cd720d6cbc53449a67ee166255325670
-
SHA1
066610a4c88c92b438b9ed1402af6692da57eae2
-
SHA256
b71e2977cbbd1b7ae29a261e40307dadfcccf947818819e6cb91d4091d37db9c
-
SHA512
ae602049d91f7fefd2f059ce5139d81ad4981a64ea6097a784e1507914e7532f4529855051ed6dada6adc735571350ec3b555aaf5d17192d1b939883f1cda06b
-
SSDEEP
3072:TQPzjCUSV3/X7qX81hcqLK8O7PffqIFQRdcib1vXAkq7NMvre0ET5CROfi4yF9Dx:omvyk7K57PfCIiukRrha5nfi4yF/
Malware Config
Signatures
Files
-
b71e2977cbbd1b7ae29a261e40307dadfcccf947818819e6cb91d4091d37db9c.exe windows x86
09abd344f8257b4046743adb1d17a6c3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalHandle
CreateWaitableTimerW
OpenFile
CreateMutexW
FileTimeToLocalFileTime
GetAtomNameA
TlsFree
GetSystemDirectoryW
FlushFileBuffers
GlobalFree
GetNumberFormatA
FindNextFileW
WaitForMultipleObjectsEx
QueryDosDeviceW
QueryPerformanceCounter
GetACP
GetFileSize
SetLocalTime
lstrcmpW
DeleteFileW
GetNumberFormatW
SetSystemTimeAdjustment
LoadLibraryExW
OpenSemaphoreW
CreateWaitableTimerA
MulDiv
GetOverlappedResult
GetShortPathNameA
GetCurrentThreadId
LoadLibraryExA
EnterCriticalSection
GetCurrentThread
GetSystemTime
GetThreadPriority
SetUnhandledExceptionFilter
LeaveCriticalSection
TryEnterCriticalSection
GetHandleInformation
lstrcpynA
SetCommState
GetBinaryTypeA
SizeofResource
SetCommMask
GetLocalTime
FileTimeToSystemTime
IsBadCodePtr
LoadLibraryW
GetCommandLineW
CreateMutexA
GlobalReAlloc
GlobalMemoryStatusEx
GetModuleFileNameW
FoldStringW
GlobalGetAtomNameA
lstrlenW
HeapCreate
FormatMessageW
GetTimeFormatW
GetStdHandle
GetTimeFormatA
LoadResource
HeapReAlloc
GetStartupInfoW
LockResource
LoadLibraryA
ReadFile
GetFullPathNameA
WaitForSingleObjectEx
MoveFileW
ResumeThread
GetBinaryTypeW
GetSystemDefaultLangID
RemoveDirectoryA
FindResourceExW
DeviceIoControl
ExitThread
MultiByteToWideChar
GetCommProperties
GetModuleHandleW
CompareStringW
GetProcAddress
GlobalGetAtomNameW
LocalFree
CreateSemaphoreA
GetThreadContext
VerSetConditionMask
UnmapViewOfFile
GlobalCompact
GlobalAddAtomA
EnumResourceNamesW
CreateRemoteThread
GetFileTime
CreateThread
IsDBCSLeadByte
GlobalFlags
EnumResourceTypesA
SystemTimeToFileTime
CreateNamedPipeW
FindNextFileA
UnlockFile
SetFilePointer
CallNamedPipeW
FindResourceW
IsBadReadPtr
LocalLock
HeapValidate
SetCurrentDirectoryA
GlobalAddAtomW
HeapLock
EnumSystemLocalesA
FindFirstFileW
CreateFileA
VirtualProtect
RaiseException
GetCPInfo
CreateFileMappingA
IsDBCSLeadByteEx
CompareStringA
lstrcatW
CreateEventW
CreateFileW
GetWindowsDirectoryW
HeapWalk
psapi
QueryWorkingSet
shlwapi
PathUnmakeSystemFolderA
advapi32
RegQueryValueExA
RegQueryValueExW
RegReplaceKeyA
Sections
.text Size: 135KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ