Static task
static1
Behavioral task
behavioral1
Sample
beb74d1fcc2f2b1ceeba3136d46a5d7032978009afe4c27d064ec698a78d76a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
beb74d1fcc2f2b1ceeba3136d46a5d7032978009afe4c27d064ec698a78d76a6.exe
Resource
win10v2004-20220812-en
General
-
Target
beb74d1fcc2f2b1ceeba3136d46a5d7032978009afe4c27d064ec698a78d76a6
-
Size
120KB
-
MD5
1d56625ab1f2f04235489038de407f69
-
SHA1
64213e0ecbb6452de5ec87dc9fa519fa3494eff5
-
SHA256
beb74d1fcc2f2b1ceeba3136d46a5d7032978009afe4c27d064ec698a78d76a6
-
SHA512
c3504bd1adf46d8d70ea56ff5182094aeb0fe2d3a2b2bfacd373a661b87f5b1a772e92d39e4c4b6b03d30e6af50dfcf78ff44009d82a5f519803f2cc2567409b
-
SSDEEP
384:UF8S1dckfbvnJuqz7z+amxGnQzKQEzDNlDo:CTco7HHz+amxYQoh
Malware Config
Signatures
Files
-
beb74d1fcc2f2b1ceeba3136d46a5d7032978009afe4c27d064ec698a78d76a6.exe windows x86
2d23c43802cb7c6ed6bda14f22c0d33e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
DeviceIoControl
CreateFileA
CreateProcessA
WriteFile
GetTempFileNameA
GetTempPathA
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateProcessW
lstrcatW
GetEnvironmentVariableW
CreateEventA
UnmapViewOfFile
VirtualQuery
MapViewOfFile
OpenFileMappingA
ExitProcess
GetShortPathNameW
lstrlenW
lstrcpyW
GetCommandLineW
TerminateProcess
WaitForSingleObject
Sleep
user32
wsprintfA
wsock32
closesocket
recv
send
connect
htons
socket
inet_addr
gethostbyname
WSAStartup
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 776B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ