Static task
static1
Behavioral task
behavioral1
Sample
f0ead3b31a60148b00cf51cfb8faf26060e3abc4e19ba0f56cfc841401d573be.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f0ead3b31a60148b00cf51cfb8faf26060e3abc4e19ba0f56cfc841401d573be.exe
Resource
win10v2004-20220812-en
General
-
Target
f0ead3b31a60148b00cf51cfb8faf26060e3abc4e19ba0f56cfc841401d573be
-
Size
482KB
-
MD5
65e1a424a4ad779a4e68784de4b643d9
-
SHA1
5ac688ecac745226c92f0a5ba6e6a2212cd6d396
-
SHA256
f0ead3b31a60148b00cf51cfb8faf26060e3abc4e19ba0f56cfc841401d573be
-
SHA512
9baba4b4268fba13691057164d693ab04ab663f743ba5710a2c7dabcc6b03d50801b20c75efd1d35bc30bac52874f495a7618e001c65848c36c7f41993289b37
-
SSDEEP
6144:7aj23fguhe2XJHZmGE+oHnemCiTuLq7CYTAbRvKNgHsoY723ta8IUauQ1V/88KB7:7aGhpmmiTwbRvRsea8lcN+2+
Malware Config
Signatures
Files
-
f0ead3b31a60148b00cf51cfb8faf26060e3abc4e19ba0f56cfc841401d573be.exe windows x86
6940a540f2fc9361f3e6c04e8df007a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
Process32First
Process32Next
AddAtomA
CopyFileA
CreateDirectoryA
CreatePipe
DeleteFileA
DuplicateHandle
ExitProcess
FindAtomA
FindClose
FindFirstFileA
FindNextFileA
GetAtomNameA
GetCurrentProcess
GetCurrentProcessId
GetDriveTypeA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetVersionExA
LoadLibraryA
OpenProcess
PeekNamedPipe
RemoveDirectoryA
SetUnhandledExceptionFilter
TerminateProcess
wininet
InternetGetConnectedState
wsock32
WSACleanup
WSAStartup
closesocket
connect
gethostbyaddr
gethostbyname
htonl
htons
inet_addr
inet_ntoa
ioctlsocket
ntohs
recv
send
shutdown
socket
urlmon
URLDownloadToFileA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyA
RegSetValueExA
msvcrt
_close
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
atoi
exit
fflush
fopen
fprintf
fread
free
fwrite
malloc
memset
perror
rand
setbuf
signal
sprintf
srand
sscanf
strcat
strncat
strncmp
strrchr
strtok
shell32
ShellExecuteA
user32
ExitWindowsEx
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.stab Size: 68KB - Virtual size: 68KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.stabstr Size: 354KB - Virtual size: 354KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ