Static task
static1
Behavioral task
behavioral1
Sample
99bd98e44ab4eaa086052119dab12a6714c9663b72b561e50118155dc4f750a0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
99bd98e44ab4eaa086052119dab12a6714c9663b72b561e50118155dc4f750a0.exe
Resource
win10v2004-20220812-en
General
-
Target
99bd98e44ab4eaa086052119dab12a6714c9663b72b561e50118155dc4f750a0
-
Size
82KB
-
MD5
5723c27a5968cd81042a11074bf8fdbf
-
SHA1
39b36cb7e120f0ce6ac9096bc457acb72f15d59b
-
SHA256
99bd98e44ab4eaa086052119dab12a6714c9663b72b561e50118155dc4f750a0
-
SHA512
ff8a0aff3414a7d0e0bc54b8337bec7dca3cfdee74cd12747f366bdd6631ebe7ce2bdf9d5384687ddb176c5b4efdf555f1f67d6cb117906d115c5e450576ebaf
-
SSDEEP
1536:4lE0MDMi69yTfg6tcwPlxoGY+QVWfylUZwGH7XsJOjZ9bXR7zCxu3qgiRz:4G0MDMi69mnxjY+QwFxxbXxzCaqFz
Malware Config
Signatures
Files
-
99bd98e44ab4eaa086052119dab12a6714c9663b72b561e50118155dc4f750a0.exe windows x86
55f13bd229436cb47d17ab38285865ac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc40
ord2199
ord3578
ord1539
ord3890
ord4657
ord2086
ord4608
ord5647
ord3837
ord4694
ord3314
ord4296
ord3922
ord2323
ord1785
ord5649
ord3268
ord4510
ord1494
ord4677
ord2140
ord1850
ord4691
ord2617
ord2754
ord2843
ord3945
ord2744
ord2845
ord2620
ord2696
ord3345
ord3346
ord3340
ord2694
ord3580
ord4101
ord3907
ord3134
ord570
ord315
ord731
ord3724
ord1014
ord1035
ord706
ord5139
ord3656
ord4173
ord5360
ord2081
ord662
ord421
ord1060
ord5145
ord4853
ord1759
ord3820
ord4321
ord4428
ord4374
ord5132
ord4850
ord1718
ord856
ord3109
ord1758
ord1805
ord538
ord4681
ord729
ord4142
ord3761
ord5648
ord3963
ord2234
ord2197
ord5070
ord3431
ord965
ord4627
ord2097
ord2909
ord4713
ord4715
ord2390
ord3579
ord4165
ord4719
ord4703
ord5053
ord4096
ord3906
ord3259
ord721
ord504
ord2299
ord1100
ord3859
ord4450
ord4312
ord486
ord2514
ord274
ord1368
msvcrt40
_initterm
__getmainargs
__p__acmdln
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_exit
_onexit
__dllonexit
exit
_itoa
__CxxFrameHandler
atoi
_XcptFilter
_setmbcp
kernel32
Sleep
GetVersion
GetLastError
GetStartupInfoA
GetModuleHandleA
user32
GetSystemMenu
DrawIcon
GetClientRect
AppendMenuA
SetTimer
IsIconic
KillTimer
EnableWindow
LoadIconA
GetSystemMetrics
SendMessageA
wsock32
ioctlsocket
WSAGetLastError
inet_addr
WSACleanup
WSAStartup
gethostbyname
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ