Static task
static1
Behavioral task
behavioral1
Sample
732cec14ce031c2a72f4d38542315eb3be4f82deb0bf51ff38a2b834a677ed7d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
732cec14ce031c2a72f4d38542315eb3be4f82deb0bf51ff38a2b834a677ed7d.exe
Resource
win10v2004-20221111-en
General
-
Target
732cec14ce031c2a72f4d38542315eb3be4f82deb0bf51ff38a2b834a677ed7d
-
Size
165KB
-
MD5
017486f63fb88b9a029db8c323ec4080
-
SHA1
24f52b8838a0ae52e96e6f9b99496e3e0ea21c45
-
SHA256
732cec14ce031c2a72f4d38542315eb3be4f82deb0bf51ff38a2b834a677ed7d
-
SHA512
6fb18eab6bdee6ef62f8b5dbb15c650760fa6f37fee1951f04dccb66f3839b0c5a9f9964812a370e94fab3e0b6fd0231233d24ef9f765c3786d9371416fcf3b7
-
SSDEEP
3072:vGbOM+BEqaDpPXlh89eM206LqpmWxtwkqDBU28W1fLqPh9qkws+SIM:vGbOMwIpPI9H206qDxtwkq8IzqppwXK
Malware Config
Signatures
Files
-
732cec14ce031c2a72f4d38542315eb3be4f82deb0bf51ff38a2b834a677ed7d.exe windows x86
7b3c47b6458103a696f2c952e3307945
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
VirtualFree
VirtualAlloc
lstrcpyA
SetEvent
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
FreeLibrary
lstrcmpA
GetVersionExA
CreateDirectoryA
LocalFree
LocalAlloc
RemoveDirectoryA
WriteFile
Sleep
ReadFile
SetFilePointer
GetLastError
SetLastError
CreateProcessA
GetCurrentProcess
CreateRemoteThread
VirtualAllocEx
OpenProcess
MultiByteToWideChar
ExitProcess
GetLocalTime
CreateEventA
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
OutputDebugStringA
ReleaseMutex
SetErrorMode
GetModuleHandleA
InterlockedExchange
RaiseException
GetStartupInfoA
msvcrt
strlen
strstr
memcmp
strcpy
strchr
malloc
strcmp
free
_except_handler3
strrchr
rename
strcat
atoi
strncmp
_errno
wcscpy
strncpy
strtok
_ftol
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_CxxThrowException
memmove
memcpy
strncat
??3@YAXPAX@Z
_strnicmp
__CxxFrameHandler
??2@YAPAXI@Z
memset
ceil
_strupr
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
msvfw32
ICSendMessage
ICSeqCompressFrameEnd
Sections
.ujyhkuy Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 134KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ