Static task
static1
Behavioral task
behavioral1
Sample
77c43f00318a2328b7b0e33a14e6dc4237664b2d4147a42a4a376ddb9d10cfbb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
77c43f00318a2328b7b0e33a14e6dc4237664b2d4147a42a4a376ddb9d10cfbb.exe
Resource
win10v2004-20220812-en
General
-
Target
77c43f00318a2328b7b0e33a14e6dc4237664b2d4147a42a4a376ddb9d10cfbb
-
Size
35KB
-
MD5
7c8b2fb166fef84cf4d3e4a365e3e0d9
-
SHA1
50c01822f8a2919898429058011911205026d9c1
-
SHA256
77c43f00318a2328b7b0e33a14e6dc4237664b2d4147a42a4a376ddb9d10cfbb
-
SHA512
8323903502956b2bb2ae4e03c185ce5eafebd3f68570d0aa3999edfe8e9dc2dbb354c3e2856a931a670451181eb0f1a7c1200d733e954138066c4fc0a4ce63ce
-
SSDEEP
768:EMZmQCsPxFMIEEdaXV6lYsEYXYOGo29NGuE:ErQLpFMBrl9
Malware Config
Signatures
Files
-
77c43f00318a2328b7b0e33a14e6dc4237664b2d4147a42a4a376ddb9d10cfbb.exe windows x86
dc9c829d0a1dd7eaaad07d15422760fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
ContinueDebugEvent
CreateFileA
CreateThread
ExitProcess
GetCurrentDirectoryA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetThreadContext
GetVersionExA
IsDebuggerPresent
CloseHandle
SetThreadContext
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WaitForDebugEvent
WriteFile
wsock32
gethostbyname
WSAStartup
WSACleanup
user32
MessageBoxA
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 822B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE