Static task
static1
Behavioral task
behavioral1
Sample
f02cdee2df367195dbf4ee2c241f823c6e69d89ec644a1b674a17bd69eb4afdb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f02cdee2df367195dbf4ee2c241f823c6e69d89ec644a1b674a17bd69eb4afdb.exe
Resource
win10v2004-20220901-en
General
-
Target
f02cdee2df367195dbf4ee2c241f823c6e69d89ec644a1b674a17bd69eb4afdb
-
Size
39KB
-
MD5
126fa3ed7b131e8de7b4fee1b2ce0e21
-
SHA1
ac007f71716b378cdc257220360f8b03f4c78175
-
SHA256
f02cdee2df367195dbf4ee2c241f823c6e69d89ec644a1b674a17bd69eb4afdb
-
SHA512
0525ecbb84f4c2a8f5217f03b66c5499b08919ed47c8f4741bbb4ce9f8e25fc21ce26f2838e392eb0517e369a4c178d8865ac9a55ba8b3facde09f5c5cb3b193
-
SSDEEP
768:+8xO8TilqRhTUx55i9VBSTKJVR4U9uttTi2L58Owv:5PTs6Tmni9eTKJVicun+2yN
Malware Config
Signatures
Files
-
f02cdee2df367195dbf4ee2c241f823c6e69d89ec644a1b674a17bd69eb4afdb.exe windows x86
d428d108be42f1011158b3f046e1338d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
SetLastError
lstrcpynA
AllocateUserPhysicalPages
SetCommBreak
LocalFree
GetACP
SetTimerQueueTimer
Toolhelp32ReadProcessMemory
CopyFileA
FindCloseChangeNotification
GetNamedPipeInfo
LocalSize
ContinueDebugEvent
GetCommandLineA
GetStartupInfoA
ExitProcess
ntdll
RtlZeroHeap
vsprintf
NtLockFile
strstr
NtReplaceKey
Sections
.rdata Size: 4KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
WEIJUNLI Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ