Static task
static1
Behavioral task
behavioral1
Sample
bed3460fffde7c6b985c26df45b38de1a157350b4dfc5769bfbbb62c4c7df9f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bed3460fffde7c6b985c26df45b38de1a157350b4dfc5769bfbbb62c4c7df9f8.exe
Resource
win10v2004-20220812-en
General
-
Target
bed3460fffde7c6b985c26df45b38de1a157350b4dfc5769bfbbb62c4c7df9f8
-
Size
118KB
-
MD5
aff87fee0cf3d69d0a44c3a1bb9df8f0
-
SHA1
332d37302613703f30ccee5570db8e41bf7be350
-
SHA256
bed3460fffde7c6b985c26df45b38de1a157350b4dfc5769bfbbb62c4c7df9f8
-
SHA512
2e9063ab7698ad3af98675f1489fee509c45b076c24aaa627e9e2baa8dfaca4843b9b5b08a2f7bde552508a9d2e1e7a37734b52f58bfb104b4fb29c3d76ab076
-
SSDEEP
3072:Ggs2PS4kbevUebPCl70W/SH3BRojhyXX:NH1fbO04TVC
Malware Config
Signatures
Files
-
bed3460fffde7c6b985c26df45b38de1a157350b4dfc5769bfbbb62c4c7df9f8.exe windows x86
dad88e3c6c12548a5d3a14e6a6637936
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
Sleep
ReadProcessMemory
ReadFile
VirtualAlloc
GetModuleFileNameA
CloseHandle
WaitForSingleObject
CopyFileA
LoadLibraryA
GetSystemTime
SetEndOfFile
CreateFileW
FreeLibrary
SetFilePointer
GetFileSize
GetProcAddress
CreateFileA
WriteConsoleW
SetStdHandle
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameW
SetHandleCount
GetFileType
IsProcessorFeaturePresent
HeapCreate
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetUserDefaultLCID
GetProcessHeap
user32
MessageBoxA
advapi32
RegOpenKeyExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
SHCreateDirectoryExA
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ