Static task
static1
Behavioral task
behavioral1
Sample
871fa2305cb19a09808a67973a3bbbf4105380d29c42bece6fc7974f35aea720.exe
Resource
win7-20220812-en
General
-
Target
871fa2305cb19a09808a67973a3bbbf4105380d29c42bece6fc7974f35aea720
-
Size
354KB
-
MD5
66386e25cf7dbdaca30da7cc9792cf41
-
SHA1
2725601daf6b3f348bdfb84a2c9b9ec7ed11ee4a
-
SHA256
871fa2305cb19a09808a67973a3bbbf4105380d29c42bece6fc7974f35aea720
-
SHA512
dc37a991347e619f833a98479e292139981cae22efc9f95590a255ce932332c791b9772edf8e81702b0efd9a7a4795ac48d08b9e649db9127b89e21387892d16
-
SSDEEP
6144:eipWyGC/ZU98ddpbAyIbyI9vF1OiZFxyFi/qYDeDahNurF0+gK02/5DXlARmjd2j:eipWjC/ZUyCyIWI9XgkSWlNiC+rdXew
Malware Config
Signatures
Files
-
871fa2305cb19a09808a67973a3bbbf4105380d29c42bece6fc7974f35aea720.exe windows x86
83e7bcff02035798eb9a5599353dac81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
fopen
fseek
fclose
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
Sleep
CreateThread
CloseHandle
FreeLibrary
HeapAlloc
HeapFree
InitializeCriticalSection
LoadLibraryA
GetProcAddress
EnterCriticalSection
HeapReAlloc
LeaveCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
ReleaseSemaphore
user32
CallWindowProcA
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.code Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 3B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE