Static task
static1
Behavioral task
behavioral1
Sample
d34175e1158edba1fe00302a8d4ca7de6ce196cbfb8f91ba4a93df9ae6ee6e01.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d34175e1158edba1fe00302a8d4ca7de6ce196cbfb8f91ba4a93df9ae6ee6e01.exe
Resource
win10v2004-20220901-en
General
-
Target
d34175e1158edba1fe00302a8d4ca7de6ce196cbfb8f91ba4a93df9ae6ee6e01
-
Size
71KB
-
MD5
913c0a2af66e8a010285683df98dbcbd
-
SHA1
7717b3dc3ff6c6eadbc43c45d31c52195ec09b0e
-
SHA256
d34175e1158edba1fe00302a8d4ca7de6ce196cbfb8f91ba4a93df9ae6ee6e01
-
SHA512
7536f427fed4aea5527ec3356e14335e7d9e7c77c73df4b81686687c34321771537518b66431754494b58035c97abeddc049af51f6c1513eb82527738e46485a
-
SSDEEP
1536:FIPAzqIfhbp1pG7FRtIRy8J1QiwQvyT3p3ouSsV/jTRwcIo8gVNx:FORtIRHi+qZGsVUonl
Malware Config
Signatures
Files
-
d34175e1158edba1fe00302a8d4ca7de6ce196cbfb8f91ba4a93df9ae6ee6e01.exe windows x86
562654997349ff5a84997b1d4889e304
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
longjmp
fopen
_setjmp3
fclose
malloc
free
strlen
exit
__p__iob
fprintf
sprintf
fwrite
fflush
ferror
getenv
sscanf
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
DeleteFileA
HeapFree
TlsGetValue
HeapAlloc
TlsSetValue
TlsAlloc
HeapReAlloc
WaitForMultipleObjects
EnterCriticalSection
CloseHandle
LeaveCriticalSection
GetCurrentThreadId
InitializeCriticalSection
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
CallWindowProcA
Sections
.code Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_WRITE
.. Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
..aer Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ