Static task
static1
Behavioral task
behavioral1
Sample
dcf49d8e571bfac8ab12e626d17d30859f6187b6548ad0fb1c985b37ad8c29b8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dcf49d8e571bfac8ab12e626d17d30859f6187b6548ad0fb1c985b37ad8c29b8.exe
Resource
win10v2004-20221111-en
General
-
Target
dcf49d8e571bfac8ab12e626d17d30859f6187b6548ad0fb1c985b37ad8c29b8
-
Size
126KB
-
MD5
9962d4fbf799546bf609acd59424ca20
-
SHA1
4b47bf7aa26db6fa0392b5ae3dc20eb31878a61d
-
SHA256
dcf49d8e571bfac8ab12e626d17d30859f6187b6548ad0fb1c985b37ad8c29b8
-
SHA512
ffc231ac0f6f02fe9adb7d6e9d4a2cbba07219cf1eadf6d6f05b1cb6ae39e5d078ec06046b766599869839dc65b73a9c6f6ca608edfcd5a0ea817e3a6c5b98b2
-
SSDEEP
3072:kr/AOCbZREwhZcwrm4j8VAmPZQsHHV8eg1meKs40TpafEPq:PXbzRhZckjagsgtPLbS
Malware Config
Signatures
Files
-
dcf49d8e571bfac8ab12e626d17d30859f6187b6548ad0fb1c985b37ad8c29b8.exe windows x86
90bf5ecb3a6a63d7f51c3289f993fb43
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetEnvironmentStrings
UnlockFile
LoadResource
VirtualFreeEx
GetProcAddress
GetFileAttributesA
FlushInstructionCache
GetProfileSectionA
LocalAlloc
CreateDirectoryA
GetMailslotInfo
GetFileTime
GetCPInfoExA
GetUserDefaultUILanguage
SetFileTime
ResumeThread
GetPrivateProfileStringA
ClearCommBreak
VirtualProtectEx
LoadLibraryExA
PeekNamedPipe
FindResourceA
IsProcessorFeaturePresent
GlobalReAlloc
GetNamedPipeHandleStateA
IsBadCodePtr
GetOEMCP
GetWindowsDirectoryA
GetFileSize
GetProcessHeap
HeapAlloc
FoldStringA
GetSystemDefaultLangID
GetTickCount
GlobalFlags
WaitForMultipleObjects
GlobalUnfix
GlobalUnlock
VirtualLock
GetCommModemStatus
SignalObjectAndWait
FlushConsoleInputBuffer
LocalHandle
FreeResource
WriteProfileStringA
FindClose
GetShortPathNameA
DosDateTimeToFileTime
VirtualProtect
ReleaseSemaphore
GlobalUnWire
WaitForSingleObject
HeapCreate
GetExitCodeThread
SetLastError
GetThreadLocale
PeekConsoleInputA
OutputDebugStringA
WaitNamedPipeA
GetConsoleOutputCP
GetVersion
GetSystemDirectoryA
CreateRemoteThread
LocalLock
GetThreadPriorityBoost
QueryDosDeviceA
GetLogicalDriveStringsA
RemoveDirectoryA
GetUserDefaultLangID
ConnectNamedPipe
IsBadWritePtr
ClearCommError
AddAtomA
IsValidCodePage
LoadLibraryA
GlobalFix
AllocConsole
DeviceIoControl
ReadFile
GetEnvironmentVariableA
QueryPerformanceCounter
GlobalAddAtomA
OpenFileMappingA
LockFile
GlobalAlloc
GlobalFree
UnmapViewOfFile
WaitForMultipleObjectsEx
GetConsoleCursorInfo
GetCurrentThread
WriteFile
VirtualFree
SizeofResource
LocalSize
GlobalHandle
GetThreadTimes
CopyFileA
CreateMailslotA
LocalCompact
DefineDosDeviceA
GetVolumeInformationA
HeapFree
CreateSemaphoreA
OpenSemaphoreA
VirtualQueryEx
VirtualUnlock
FindAtomA
CreateFileMappingA
FindNextChangeNotification
GetSystemDefaultUILanguage
HeapReAlloc
CreateConsoleScreenBuffer
CreateFiber
LocalShrink
DeleteAtom
IsBadStringPtrA
GetModuleHandleA
GetProcessWorkingSetSize
InitAtomTable
GetTempPathA
WideCharToMultiByte
LocalUnlock
GetFileType
GetCommConfig
PulseEvent
GetPrivateProfileStructA
GetProcessAffinityMask
VirtualAllocEx
CallNamedPipeA
FreeConsole
GetLogicalDrives
OpenEventA
CloseHandle
GetSystemDefaultLCID
CommConfigDialogA
GetConsoleCP
GetCommTimeouts
FlushFileBuffers
GetCommandLineA
GetStartupInfoA
msvcrt
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE