Static task
static1
Behavioral task
behavioral1
Sample
beff26bd236c6aeea5d88879f5dbed54d03311b88baad1934d8d9c1b3a473fda.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
beff26bd236c6aeea5d88879f5dbed54d03311b88baad1934d8d9c1b3a473fda.exe
Resource
win10v2004-20221111-en
General
-
Target
beff26bd236c6aeea5d88879f5dbed54d03311b88baad1934d8d9c1b3a473fda
-
Size
165KB
-
MD5
66097599fbf2458c1a99a3beaffc8dba
-
SHA1
3126c67bd241818e1b01ed15c9c1e7848716b41d
-
SHA256
beff26bd236c6aeea5d88879f5dbed54d03311b88baad1934d8d9c1b3a473fda
-
SHA512
cf59c87c7176acbcfd38c829f657ccf6937f7381ad0de3a95def6e07b02fc60c05839d452ebe8dc46b45e51a1fd69a9c3a116c20333bfe6048409569f2c74341
-
SSDEEP
3072:fGxNlRuwKMRY7FznCZQfLuVNViu7lsUUo25SUsjMJjwWAVub34u2QZwM0l:ebqwnSkeLnogt4IHXbI0wZ
Malware Config
Signatures
Files
-
beff26bd236c6aeea5d88879f5dbed54d03311b88baad1934d8d9c1b3a473fda.exe windows x86
337f9bbb532a824227d29b1e3e3bc485
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
GlobalGetAtomNameA
UnhandledExceptionFilter
LoadLibraryA
SetUnhandledExceptionFilter
GetLocaleInfoA
HeapReAlloc
FreeLibrary
MultiByteToWideChar
IsValidCodePage
WriteFile
SetFilePointer
GetDateFormatA
VirtualAlloc
GetACP
LeaveCriticalSection
GetCurrentProcess
GetConsoleOutputCP
EnumResourceNamesW
SetStdHandle
TerminateProcess
GetCurrentProcessId
GetOEMCP
IsDebuggerPresent
GetStringTypeA
EnterCriticalSection
GetTimeFormatA
InitializeCriticalSection
HeapSize
GetSystemTimeAsFileTime
WriteConsoleA
GetCPInfo
RaiseException
shlwapi
SHCreateStreamOnFileW
PathAppendA
SHCreateStreamOnFileEx
PathIsFileSpecA
PathIsContentTypeA
PathCreateFromUrlW
rpcrt4
RpcStringFreeA
Sections
.text Size: 81KB - Virtual size: 481KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ