?OUTFILESFD@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
c87128a135ab39d3c67f9cd1b722b568c2001632e59d19a690cc8e50ada06eea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c87128a135ab39d3c67f9cd1b722b568c2001632e59d19a690cc8e50ada06eea.exe
Resource
win10v2004-20221111-en
General
-
Target
c87128a135ab39d3c67f9cd1b722b568c2001632e59d19a690cc8e50ada06eea
-
Size
144KB
-
MD5
6017ce1c164daccf7ef2858187f04bd2
-
SHA1
761fa5f983c7c3489a0ed3bd61e7c7f4bee53f22
-
SHA256
c87128a135ab39d3c67f9cd1b722b568c2001632e59d19a690cc8e50ada06eea
-
SHA512
c5075dc1cf9e858c9e75ee2ca6dbd3f0442680638575c3097f94a9667a9a02e1f1ccaf784a03bbbba20367869124cfa94af937ff492cc318e42fd17d9b6206ea
-
SSDEEP
1536:Tj2Y7V0PazeNMzqw5djjNN+LwNoNBwO7Hu2ia4et0p+e85tVkscohmRMgBssOPA3:mf+eNFwjr+DLMi4l+TtLhmRlBCAYc
Malware Config
Signatures
Files
-
c87128a135ab39d3c67f9cd1b722b568c2001632e59d19a690cc8e50ada06eea.exe windows x86
1fac8010bf3ab3b033290dd2b6d72735
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SetThreadPriority
GetProcAddress
WaitForSingleObject
GetFileSize
GetTickCount
CloseHandle
SuspendThread
DeleteFileW
VirtualQuery
GetSystemInfo
VirtualProtect
SetStdHandle
Sleep
GetLocaleInfoA
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
RtlUnwind
DeleteCriticalSection
IsBadWritePtr
IsBadReadPtr
HeapValidate
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
HeapDestroy
HeapCreate
HeapFree
VirtualFree
InitializeCriticalSection
HeapAlloc
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
SetFocus
LoadImageA
LoadCursorA
gdi32
CreatePen
SelectObject
ws2_32
closesocket
select
winmm
mciSendCommandA
auxSetVolume
avifil32
AVIClearClipboard
winscard
SCardCancel
Exports
Exports
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ