Static task
static1
Behavioral task
behavioral1
Sample
58fefbaffe1ee218de4295c81aa282138ebd7af3206b0cfacf674e01cdee7374.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
58fefbaffe1ee218de4295c81aa282138ebd7af3206b0cfacf674e01cdee7374.exe
Resource
win10v2004-20221111-en
General
-
Target
58fefbaffe1ee218de4295c81aa282138ebd7af3206b0cfacf674e01cdee7374
-
Size
286KB
-
MD5
31090bc6240bd9db83f40e7d053712d0
-
SHA1
a11d06f4d808b8ecfe6e3cf1c3743b846cd9d824
-
SHA256
58fefbaffe1ee218de4295c81aa282138ebd7af3206b0cfacf674e01cdee7374
-
SHA512
8099ab6798e0f0a3268c1c5698983061270220df3e73e53c996465d4b4d19a39af26ab51976019552d2bb12c8e2c852a81fda207b3779b76f58cb64a330922d6
-
SSDEEP
6144:lAP2Z1ATQkObvqCASIuyFQ38l9yMk8633dftEwAajbrG8Te:fHjFXAfpOcc/3BCQjHG3
Malware Config
Signatures
Files
-
58fefbaffe1ee218de4295c81aa282138ebd7af3206b0cfacf674e01cdee7374.exe windows x86
783e1c0cffa681059eee7b6eeb90e1b3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
__dllonexit
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
__FrameUnwindFilter
printf
_lock
_onexit
_decode_pointer
_crt_debugger_hook
_controlfp_s
_invoke_watson
_initterm
_except_handler4_common
kernel32
UnhandledExceptionFilter
LockResource
GetModuleFileNameW
SizeofResource
LoadResource
FindResourceA
CloseHandle
CreateMutexA
GetModuleHandleA
OpenMutexA
LoadLibraryA
GetProcAddress
VirtualFree
IsDebuggerPresent
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
LoadStringA
shell32
SHGetFolderPathA
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
msvcm80
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
mscoree
_CorExeMain
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 435KB - Virtual size: 434KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 906B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ