Static task
static1
Behavioral task
behavioral1
Sample
b82c787e2af5a4d5427fa5ffe5828d0bedfca6fa1473e8b6a728b472f830c312.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b82c787e2af5a4d5427fa5ffe5828d0bedfca6fa1473e8b6a728b472f830c312.exe
Resource
win10v2004-20220812-en
General
-
Target
b82c787e2af5a4d5427fa5ffe5828d0bedfca6fa1473e8b6a728b472f830c312
-
Size
39KB
-
MD5
6d464616c4b171c4e15c5976b3b1176d
-
SHA1
24e9d00889e73a7f170f749a815f8f476701dd0b
-
SHA256
b82c787e2af5a4d5427fa5ffe5828d0bedfca6fa1473e8b6a728b472f830c312
-
SHA512
c5faed55880511ebd074110753b9c4ac051bb70bebcccb0e96bfc87759bc6f7c865814070748196f14775ac1a9a2f0b83a1378bbe5582080f250362918597af2
-
SSDEEP
768:XdVkOeSmOunfftUL9x868R8Z8s888m8E8Qvm72bdGlc73kO25jYnHNANPLhKLzDK:nxmOun3tULzzq+5hRpfvm72bcly2entE
Malware Config
Signatures
Files
-
b82c787e2af5a4d5427fa5ffe5828d0bedfca6fa1473e8b6a728b472f830c312.exe windows x86
511e23b6641600ca85cba1e690f7c295
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
fopen
fseek
fclose
_CItanh
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
Sleep
CreateThread
CloseHandle
FreeLibrary
HeapAlloc
HeapFree
EnterCriticalSection
HeapReAlloc
LeaveCriticalSection
InitializeCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
ReleaseSemaphore
user32
CallWindowProcA
winmm
mciSendCommandA
Sections
.code Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 3B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ