Static task
static1
Behavioral task
behavioral1
Sample
b7fe510e6061b979a822493ada8be639a6bbd0e3bec54dd0eefd31858444c3b3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b7fe510e6061b979a822493ada8be639a6bbd0e3bec54dd0eefd31858444c3b3.exe
Resource
win10v2004-20221111-en
General
-
Target
b7fe510e6061b979a822493ada8be639a6bbd0e3bec54dd0eefd31858444c3b3
-
Size
76KB
-
MD5
e610916bc3b413540d42d81c6feb68f6
-
SHA1
e7dfccba0f3c3f784bd3005fba270147dcd5800c
-
SHA256
b7fe510e6061b979a822493ada8be639a6bbd0e3bec54dd0eefd31858444c3b3
-
SHA512
24cd9b4f7b68da2c4e0039853e93adbd5e760ddf253dca662af8e5d59f2af28c59925d71ae4e7c84cf18f84fdeeab415ae08fad5120d93cf56b9cd571846788e
-
SSDEEP
1536:ilWaDbRrbNXneO22QJSlc4sT6/H4nYRvE1Agf0:OpDbBBXnrhpKM/N
Malware Config
Signatures
Files
-
b7fe510e6061b979a822493ada8be639a6bbd0e3bec54dd0eefd31858444c3b3.exe windows x86
bfe4de637e3790ba1f804ca47dd95ae7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
ReadProcessMemory
lstrcpyA
CreateProcessA
lstrcatA
GetWindowsDirectoryA
DuplicateHandle
GetCurrentProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetComputerNameA
SetFileAttributesA
lstrcmpA
CopyFileA
DeleteFileA
VirtualProtectEx
lstrlenA
GetSystemDirectoryA
GetFileSize
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
ExitProcess
GetStartupInfoA
GetCommandLineA
CreateRemoteThread
SetLastError
GetCurrentProcessId
VirtualFree
WriteProcessMemory
Sleep
GetModuleHandleA
GetProcAddress
WaitForSingleObject
WriteFile
CloseHandle
VirtualAlloc
GetPriorityClass
ResumeThread
GetTempPathA
GetFileTime
SetFileTime
user32
FindWindowA
GetWindowThreadProcessId
wsprintfA
advapi32
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
GetUserNameA
RegSetValueExA
shlwapi
SHDeleteKeyA
msvcrt
_strrev
strrchr
strncpy
strchr
atoi
free
malloc
_strnicmp
Sections
.code Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE