Static task
static1
Behavioral task
behavioral1
Sample
292f7df5387b36e3584f44835dead3529e1a36c3083fb900c5dc5ac8b9a3ddc6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
292f7df5387b36e3584f44835dead3529e1a36c3083fb900c5dc5ac8b9a3ddc6.exe
Resource
win10v2004-20220812-en
General
-
Target
292f7df5387b36e3584f44835dead3529e1a36c3083fb900c5dc5ac8b9a3ddc6
-
Size
47KB
-
MD5
b5610f7b64e9439a87e27963190d4b75
-
SHA1
ebb9498bb30af36984f606e7c3e24882c33d37de
-
SHA256
292f7df5387b36e3584f44835dead3529e1a36c3083fb900c5dc5ac8b9a3ddc6
-
SHA512
dba7f22c01b5b7ba844a80f89e4e2e733afcd27bccba27a9bbc2a37c62ffc77cb9fae06c940ad4e188a9a982a8dca44e90359d7944abd9709fd757d5573dd5b6
-
SSDEEP
768:IyEChCZhsI3tfZNfDKJsTHog2XRXGUyg3Pk0w7FNDoo:L+EWBXIgvUyg3rioo
Malware Config
Signatures
Files
-
292f7df5387b36e3584f44835dead3529e1a36c3083fb900c5dc5ac8b9a3ddc6.exe windows x86
23957447f9a27ae0c5164ec5932e7c96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
Sleep
CreateThread
LCMapStringA
ReadFile
SetEndOfFile
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
SetFilePointer
SetStdHandle
CreateFileA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
RtlUnwind
VirtualFree
HeapCreate
GetLastError
SetConsoleCtrlHandler
ExitProcess
TerminateProcess
GetCurrentProcess
GetCommandLineA
GetVersion
UnhandledExceptionFilter
FlushFileBuffers
WriteFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapAlloc
HeapFree
CloseHandle
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
LCMapStringW
ws2_32
gethostbyname
connect
htons
htonl
setsockopt
bind
listen
socket
getpeername
select
__WSAFDIsSet
recv
ntohs
send
closesocket
accept
inet_ntoa
WSAStartup
WSACleanup
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ