?BreadA@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
1cddd9455dceade3d8337a03d9b42f4ec55e1c73da4dc38f133278998b27befa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1cddd9455dceade3d8337a03d9b42f4ec55e1c73da4dc38f133278998b27befa.exe
Resource
win10v2004-20220901-en
General
-
Target
1cddd9455dceade3d8337a03d9b42f4ec55e1c73da4dc38f133278998b27befa
-
Size
144KB
-
MD5
0a1912792c2daeaaea0d0aefc919e4c0
-
SHA1
4f547cb6877a2215995c1ff1764a9aa0284dd9aa
-
SHA256
1cddd9455dceade3d8337a03d9b42f4ec55e1c73da4dc38f133278998b27befa
-
SHA512
22f83b4d56ee1f9e34ee66f104d29967eea64a12261f1d953436f2e313f9ec672c4d0989228b341bbd5724a818eb95d57ba1abf2744924b2b41a475afc493321
-
SSDEEP
3072:WRvMXG2IpyQvz/V6rV62yLyUiwfN/siLRhSdn7G:laTvzdI6ZdhsiLzE7
Malware Config
Signatures
Files
-
1cddd9455dceade3d8337a03d9b42f4ec55e1c73da4dc38f133278998b27befa.exe windows x86
6b40e88937ac7562505b592a8986fb3a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSubMenu
IsCharLowerA
kernel32
SearchPathW
LocalLock
InitializeCriticalSection
GetDateFormatA
GetLocaleInfoA
GetAtomNameA
lstrcmpiW
FindResourceExW
GetVersion
GlobalMemoryStatus
GetFullPathNameA
TryEnterCriticalSection
GetTimeZoneInformation
GetShortPathNameA
SetMailslotInfo
SetCommTimeouts
EnumSystemLocalesA
SetFileAttributesA
SetThreadLocale
SetErrorMode
lstrcmpW
ResumeThread
SetSystemTimeAdjustment
SetEndOfFile
GetLocalTime
FormatMessageA
DeleteCriticalSection
GlobalHandle
GetThreadContext
ReadFile
DeviceIoControl
TransactNamedPipe
GetBinaryTypeA
MoveFileExA
SetHandleInformation
TlsSetValue
Sleep
HeapLock
GetThreadTimes
SetFileTime
MapViewOfFile
GetCurrentThreadId
lstrcpyW
SetLocalTime
GetTickCount
CancelIo
GlobalFree
GetProcAddress
MultiByteToWideChar
SetSystemTime
SetFileApisToOEM
FindCloseChangeNotification
FindResourceW
EnumResourceNamesA
GetVersionExA
SizeofResource
GlobalDeleteAtom
CreateEventW
GetTempFileNameW
EnumResourceNamesW
FindResourceA
OpenEventA
SetCommMask
CallNamedPipeW
GetTempPathA
UnmapViewOfFile
GetSystemDirectoryW
CreateSemaphoreW
ReleaseSemaphore
GetCurrentDirectoryW
SetNamedPipeHandleState
OpenFileMappingA
GetPriorityClass
SetupComm
SetPriorityClass
IsValidLanguageGroup
GetUserDefaultUILanguage
LocalAlloc
LeaveCriticalSection
GetFileAttributesExA
GetNumberFormatW
GlobalSize
GetProcessHeap
ConnectNamedPipe
GetAtomNameW
CreateDirectoryW
RtlUnwind
LocalUnlock
FindClose
OpenSemaphoreW
SetCurrentDirectoryW
OpenFileMappingW
GetCommandLineW
SuspendThread
GetTempFileNameA
GlobalCompact
lstrlenW
GetFileSize
RemoveDirectoryA
IsValidLocale
GetSystemWindowsDirectoryA
CloseHandle
FreeLibrary
AreFileApisANSI
Exports
Exports
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 530B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ