Static task
static1
Behavioral task
behavioral1
Sample
d1bdf12070895d36697df50400b136fa2ee45b499fcccef176614facf4e8f020.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1bdf12070895d36697df50400b136fa2ee45b499fcccef176614facf4e8f020.exe
Resource
win10v2004-20220812-en
General
-
Target
d1bdf12070895d36697df50400b136fa2ee45b499fcccef176614facf4e8f020
-
Size
126KB
-
MD5
b17688c65ce5d7fe0495f3982cbd6487
-
SHA1
d44607381baa59a0279fad64b2ad3c1845871e9b
-
SHA256
d1bdf12070895d36697df50400b136fa2ee45b499fcccef176614facf4e8f020
-
SHA512
3bfbc4dee4a0c064a94ce58214c1ba2d9eff26cc512de316d9e7de22d9ee951aee0d34431ef813e4fc66d863c71f65f8b7851d047331fec62268e238e470ca85
-
SSDEEP
3072:epG0YTPItn5C8ZzwbNRTpM2u3Zv010c3qeLuietZw8KU+Qa:eUI5YJRTpzupvC0WqwuiUZhKU+
Malware Config
Signatures
Files
-
d1bdf12070895d36697df50400b136fa2ee45b499fcccef176614facf4e8f020.exe windows x86
691047ee5078b14e731b95ff241d01ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetOEMCP
Sleep
GetProcAddress
GetThreadPriority
SetErrorMode
HeapFree
FindResourceA
GetACP
IsBadWritePtr
DisconnectNamedPipe
WaitNamedPipeA
GlobalLock
GlobalFree
GetStdHandle
IsDebuggerPresent
CommConfigDialogA
GetConsoleCursorInfo
LocalAlloc
GlobalSize
ResumeThread
CancelIo
WaitForMultipleObjectsEx
UnmapViewOfFile
CopyFileA
GlobalHandle
GetThreadContext
InitAtomTable
CallNamedPipeA
GetDiskFreeSpaceA
GetFileSize
IsBadCodePtr
WritePrivateProfileSectionA
PurgeComm
OpenFileMappingA
WriteFile
SetFileAttributesA
HeapReAlloc
CreateDirectoryExA
VirtualAllocEx
GetShortPathNameA
LocalSize
LocalHandle
VirtualFreeEx
FindFirstChangeNotificationA
QueryDosDeviceA
EndUpdateResourceA
ClearCommBreak
GlobalFlags
HeapDestroy
GetCommMask
GetConsoleOutputCP
GetCommandLineA
RemoveDirectoryA
ReleaseMutex
GetLocalTime
CreateSemaphoreA
CreateMailslotA
GetModuleHandleA
DosDateTimeToFileTime
OpenMutexA
OpenProcess
CreateWaitableTimerA
GetVersion
GetThreadLocale
AddAtomA
GetNamedPipeHandleStateA
GetPrivateProfileIntA
VirtualProtect
VirtualFree
VirtualQueryEx
VirtualUnlock
GetLogicalDriveStringsA
SignalObjectAndWait
HeapValidate
FindCloseChangeNotification
HeapCreate
GetHandleInformation
LocalUnlock
MultiByteToWideChar
QueueUserAPC
ClearCommError
CreateFileA
WritePrivateProfileStringA
GetCurrentThread
GetCurrentThreadId
GetLogicalDrives
WaitForSingleObjectEx
FormatMessageA
FlushFileBuffers
GetProfileSectionA
CreateFiber
WriteProfileStringA
GetProcessHeaps
GlobalCompact
GetCommConfig
CancelWaitableTimer
GetCommModemStatus
GetCPInfoExA
GlobalAddAtomA
IsBadHugeWritePtr
GetMailslotInfo
GetCommTimeouts
ReadConsoleA
CreateIoCompletionPort
IsBadReadPtr
MoveFileExA
IsSystemResumeAutomatic
GetDiskFreeSpaceExA
GetProcessVersion
GetFileAttributesA
BeginUpdateResourceA
SetLastError
GetLongPathNameA
MapViewOfFile
GetExitCodeProcess
ContinueDebugEvent
GetCurrentProcess
GetProcessHeap
GetSystemDirectoryA
LoadLibraryExA
SizeofResource
DeleteFileA
ConnectNamedPipe
IsBadHugeReadPtr
DeviceIoControl
GetPrivateProfileStringA
SetFileTime
GetPrivateProfileStructA
GetProcessAffinityMask
SetEvent
GetCPInfo
GlobalWire
ReleaseSemaphore
GetThreadSelectorEntry
GetSystemDefaultLangID
UnlockFile
LocalShrink
GetVolumeInformationA
FindClose
LockFile
ReadProcessMemory
VirtualLock
GetUserDefaultLCID
CreateEventA
FreeLibrary
LocalFlags
GetStartupInfoA
msvcrt
srand
rand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE