Static task
static1
Behavioral task
behavioral1
Sample
c758bc074bb5e6ef97e36770b57f880cc9c4932750836f54dd118899608093f9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c758bc074bb5e6ef97e36770b57f880cc9c4932750836f54dd118899608093f9.exe
Resource
win10v2004-20220812-en
General
-
Target
c758bc074bb5e6ef97e36770b57f880cc9c4932750836f54dd118899608093f9
-
Size
1.1MB
-
MD5
82420b0b94d15247925958996c47810e
-
SHA1
8158ae2755ecdcaba396c06c5d54e7db0822af24
-
SHA256
c758bc074bb5e6ef97e36770b57f880cc9c4932750836f54dd118899608093f9
-
SHA512
53f389a7bd5fd03654e5b187a919184062b21c1805ca323eac7be9a85441bf8b72180809cce261862b6746f47f7254080c666c46c6eaa6c242b7ccbaf4a9419b
-
SSDEEP
24576:yJdlm0veKTlh068lbkuH32eCY002CWHE+AUkoLCLxcPZ2TyoWshq0LKf+BImC6qt:hUT/0NG02CWHE+AUkoLCLxcPZ2TyoWso
Malware Config
Signatures
Files
-
c758bc074bb5e6ef97e36770b57f880cc9c4932750836f54dd118899608093f9.exe windows x86
507de98f75208e30a751c48bc6c0e9b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
CloseHandle
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
GetProcAddress
GetModuleHandleA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
WriteFile
DeleteCriticalSection
ReadFile
GetLastError
DuplicateHandle
GetCurrentProcess
GetStdHandle
CreateFileA
CreatePipe
GetCurrentProcessId
CreateEventA
GetCurrentThreadId
GetCurrentThread
SetEvent
ResetEvent
GetExitCodeThread
CreateSemaphoreA
ReleaseSemaphore
ReleaseMutex
UnmapViewOfFile
CreateMutexA
MapViewOfFile
CreateFileMappingA
OpenEventA
LocalFree
lstrlenA
FormatMessageA
GetConsoleMode
FindFirstFileA
FindNextFileA
FindClose
CreateDirectoryA
GetFileAttributesA
LoadLibraryA
FreeLibrary
VirtualFree
GetOverlappedResult
VirtualAlloc
SetConsoleMode
GetConsoleScreenBufferInfo
ExitProcess
TerminateProcess
GetCommandLineA
GetVersion
InterlockedDecrement
InterlockedIncrement
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapAlloc
HeapReAlloc
HeapFree
GetSystemTimeAsFileTime
CreateThread
TlsSetValue
ExitThread
SetHandleCount
GetFileType
GetStartupInfoA
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetFilePointer
SetEndOfFile
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
DeleteFileA
Sleep
user32
TranslateMessage
PeekMessageA
PostMessageA
DefWindowProcA
MsgWaitForMultipleObjects
CreateWindowExA
RegisterClassA
RegisterWindowMessageA
UnregisterClassA
DestroyWindow
DispatchMessageA
advapi32
GetUserNameA
wsock32
WSAGetLastError
recv
send
shutdown
setsockopt
connect
htons
WSAAsyncSelect
socket
accept
listen
inet_addr
getpeername
ntohs
getsockname
gethostname
gethostbyname
getservbyname
closesocket
WSACleanup
WSAStartup
select
__WSAFDIsSet
bind
Sections
.text Size: 796KB - Virtual size: 794KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 208KB - Virtual size: 213KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BF@�A� Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE