Static task
static1
Behavioral task
behavioral1
Sample
9b98104762e6522714e02dc57be1b861d21ceca646a8b256f6eb68700bf49b88.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
9b98104762e6522714e02dc57be1b861d21ceca646a8b256f6eb68700bf49b88.exe
Resource
win10v2004-20220721-en
General
-
Target
9b98104762e6522714e02dc57be1b861d21ceca646a8b256f6eb68700bf49b88
-
Size
473KB
-
MD5
648bf56c26871a5d4eca3e14f94e05d1
-
SHA1
5688ced72214b3bb5eba0363d458100a21366ef4
-
SHA256
9b98104762e6522714e02dc57be1b861d21ceca646a8b256f6eb68700bf49b88
-
SHA512
9d9762797278c4c4cd060da4933a47f89a41ee49d93257b861475582afd0f52f668673c5f47d548c604e2139b9b87c6e526e54f5fc378ff132e50de0cbb0d9b5
-
SSDEEP
6144:1T+kvHkKaTLViC5onzlMCafEHb7ytBkX1eA:1TXvHkt/0xBX8g
Malware Config
Signatures
Files
-
9b98104762e6522714e02dc57be1b861d21ceca646a8b256f6eb68700bf49b88.exe windows x86
d9ac0195262e9da57733e38cf6136990
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualProtect
ExitProcess
VDMOperationStarted
SetTimerQueueTimer
SetConsoleIcon
Module32Next
EnumCalendarInfoA
GetPrivateProfileSectionW
CreateProcessW
RaiseException
user32
GetCapture
IsWindow
ShowWindow
GetKeyboardType
GetActiveWindow
GetAsyncKeyState
SetWindowPos
SetProcessWindowStation
PostMessageW
DialogBoxParamA
LockWorkStation
DisableProcessWindowsGhosting
comctl32
ImageList_Copy
ImageList_BeginDrag
winspool.drv
CloseSpoolFileHandle
XcvDataW
GetPrinterW
GetDefaultPrinterW
DeleteMonitorA
ConnectToPrinterDlg
AddPortExW
EnumPrinterDataExA
DevQueryPrintEx
DocumentPropertiesW
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ