Static task
static1
Behavioral task
behavioral1
Sample
b886bccb3f39de5bf6712e43f7496bb7540c7b019c0ad1631c097b96a1600585.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b886bccb3f39de5bf6712e43f7496bb7540c7b019c0ad1631c097b96a1600585.exe
Resource
win10v2004-20220812-en
General
-
Target
b886bccb3f39de5bf6712e43f7496bb7540c7b019c0ad1631c097b96a1600585
-
Size
234KB
-
MD5
4b3b8ba0bdf9c847c2112eb3e7691537
-
SHA1
0efb208c1f0984e081f76ac7a35fd3e669fc2f6b
-
SHA256
b886bccb3f39de5bf6712e43f7496bb7540c7b019c0ad1631c097b96a1600585
-
SHA512
62f56bf225a0372a4234955c66e32206327bb363370757e6dd6a0dcd9434be75e0046893c1f5081bd850f8e5eadaa89c86911d9dedb28fb527b29216a0bbbd97
-
SSDEEP
6144:z3CxOtzi811iBzF30RmWVB8VkJNksBXfd0+UxL:z3CQi8U0rv8VSNfV0+UB
Malware Config
Signatures
Files
-
b886bccb3f39de5bf6712e43f7496bb7540c7b019c0ad1631c097b96a1600585.exe windows x86
153108a8f605a02936ebd181486e7bc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
_CIlog
floor
ceil
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
CloseHandle
InitializeCriticalSection
WaitForSingleObject
PeekNamedPipe
HeapAlloc
HeapFree
EnterCriticalSection
HeapReAlloc
LeaveCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
CallWindowProcA
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.cod Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d... Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ