Static task
static1
Behavioral task
behavioral1
Sample
b0eef86c643a39efa581acaa4b52479708b07f5cbe67c7df6566a017a54474e9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b0eef86c643a39efa581acaa4b52479708b07f5cbe67c7df6566a017a54474e9.exe
Resource
win10v2004-20221111-en
General
-
Target
b0eef86c643a39efa581acaa4b52479708b07f5cbe67c7df6566a017a54474e9
-
Size
821KB
-
MD5
b6d83318981a34e8816f18c55264ad72
-
SHA1
a618585a61bedad006a2b3962f9d10e335460ca1
-
SHA256
b0eef86c643a39efa581acaa4b52479708b07f5cbe67c7df6566a017a54474e9
-
SHA512
4097c961647b5426814879ef905012fd63397cf1a41cc1e839bc49a1cb205eaafcab3848c8f058b97cabcb49498a3bf59213923818878d0841f2219bb56822f5
-
SSDEEP
24576:bVQs0su/L3/cF43m89bbrPph3pywpx14TnYXnYnzS:bVQs2/L/zfVdpywpLp3Yn2
Malware Config
Signatures
Files
-
b0eef86c643a39efa581acaa4b52479708b07f5cbe67c7df6566a017a54474e9.exe windows x86
1ae1ab36b560d24f34745be26632d6c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetSystemTime
lstrcpynA
lstrcmpW
lstrcpynA
lstrcpynA
CompareStringA
VirtualProtectEx
GetTimeFormatA
GetVolumeInformationA
VirtualFree
lstrcpynA
GetLastError
GetDiskFreeSpaceW
lstrcpynA
CreateMailslotA
GetModuleHandleA
lstrcpynA
lstrcpynA
lstrcpynA
WriteFile
ReadConsoleW
GetPrivateProfileIntW
lstrcpynA
GetEnvironmentVariableW
lstrcatA
lstrcpynA
CreatePipe
GetFileType
GetCurrentDirectoryA
d3d9
DebugSetLevel
Direct3DCreate9
PSGPSampleTexture
PSGPError
Sections
.text Size: 20KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qdata Size: 797KB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cdata Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ