Static task
static1
Behavioral task
behavioral1
Sample
dcd00bf255f4d5f477e2d680dccdc5cbd3c260d4746763e9d9e2528ecc3e8356.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dcd00bf255f4d5f477e2d680dccdc5cbd3c260d4746763e9d9e2528ecc3e8356.exe
Resource
win10v2004-20220812-en
General
-
Target
dcd00bf255f4d5f477e2d680dccdc5cbd3c260d4746763e9d9e2528ecc3e8356
-
Size
125KB
-
MD5
2fceb77029cff10d4acdb08920662046
-
SHA1
d5e1f5a5d927b4010a5e7c8dce703eccd94c255f
-
SHA256
dcd00bf255f4d5f477e2d680dccdc5cbd3c260d4746763e9d9e2528ecc3e8356
-
SHA512
b3d01e794c17c587692d374d4e1d3f6ea39bc356e883dbe90ad2c33ab4ecc44fd4e278463eb8389e5816dec227e4c85e912b66e741c3688d8103151019d35569
-
SSDEEP
3072:Mh0hfS6IOFjcxsFmtPxxm//lw2YLNzDdbNjVwySZ8rX5ks:MYSbs09xQK1NzbjVwySZaX5
Malware Config
Signatures
Files
-
dcd00bf255f4d5f477e2d680dccdc5cbd3c260d4746763e9d9e2528ecc3e8356.exe windows x86
b6fda07cda79a3c77dd2afbbca113a30
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLastError
GlobalAlloc
GetProcAddress
LockFile
Beep
VirtualAllocEx
DisconnectNamedPipe
GetModuleFileNameA
GlobalReAlloc
IsProcessorFeaturePresent
UnmapViewOfFile
WaitForMultipleObjectsEx
IsValidCodePage
LoadLibraryA
WritePrivateProfileSectionA
GetThreadContext
LoadResource
GetSystemDefaultLCID
SetLastError
GetTempPathA
AreFileApisANSI
GetThreadPriority
IsBadHugeReadPtr
FormatMessageA
GetLargestConsoleWindowSize
SetErrorMode
WaitForSingleObjectEx
ReadFile
ClearCommBreak
OpenMutexA
OpenProcess
GetCPInfo
GetSystemDefaultLangID
GlobalUnWire
GetDriveTypeA
GetPrivateProfileStructA
GetProcessAffinityMask
CreateRemoteThread
RemoveDirectoryA
GetFileSize
ReadConsoleA
GetBinaryTypeA
GetNamedPipeHandleStateA
CreateWaitableTimerA
ContinueDebugEvent
SetFileTime
VirtualLock
GetThreadTimes
PurgeComm
GetProcessHeap
GetEnvironmentVariableA
WriteFile
DeviceIoControl
IsDebuggerPresent
MoveFileExA
ReadProcessMemory
SetFileAttributesA
UpdateResourceA
OpenEventA
GetCPInfoExA
GetCommTimeouts
GetFullPathNameA
GetSystemDirectoryA
DeleteFileA
HeapFree
GetProfileIntA
GetHandleInformation
GetModuleHandleA
GetCurrentProcessId
CloseHandle
GetProfileSectionA
FlushViewOfFile
CreateIoCompletionPort
CreateFileA
FindClose
GetVersion
GlobalFindAtomA
DuplicateHandle
MapViewOfFile
GetPrivateProfileStringA
GetExitCodeProcess
LocalUnlock
GetLongPathNameA
GlobalUnfix
GlobalUnlock
GetProcessVersion
GetLocalTime
HeapDestroy
WritePrivateProfileStringA
CommConfigDialogA
GetDiskFreeSpaceA
SizeofResource
FindCloseChangeNotification
OpenSemaphoreA
InitAtomTable
GetPrivateProfileSectionA
VirtualAlloc
GetOEMCP
HeapAlloc
BeginUpdateResourceA
CreateDirectoryExA
VirtualFreeEx
CreateMailslotA
LocalCompact
GetCommandLineA
GetFileType
FindAtomA
MultiByteToWideChar
GetCommMask
GetUserDefaultLCID
GlobalAddAtomA
FreeResource
GetPrivateProfileSectionNamesA
GetFileTime
GetDiskFreeSpaceExA
GetPrivateProfileIntA
CreateSemaphoreA
GetThreadSelectorEntry
GetCurrentThread
HeapCreate
GetCommModemStatus
GetMailslotInfo
DefineDosDeviceA
LocalReAlloc
PostQueuedCompletionStatus
FreeLibrary
GetStdHandle
GetConsoleCP
QueryDosDeviceA
CancelWaitableTimer
ResetEvent
VirtualProtect
GetCurrentProcess
FindResourceA
PeekNamedPipe
GetProcessHeaps
ReleaseMutex
VirtualQuery
GetVolumeInformationA
Sleep
GetStartupInfoA
msvcrt
srand
rand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE