Static task
static1
Behavioral task
behavioral1
Sample
9ae767f752027fc744992be99d86270d653f68612269c837ad9ee3257c16b89b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ae767f752027fc744992be99d86270d653f68612269c837ad9ee3257c16b89b.exe
Resource
win10v2004-20220901-en
General
-
Target
9ae767f752027fc744992be99d86270d653f68612269c837ad9ee3257c16b89b
-
Size
171KB
-
MD5
be91a8fe6567bf89f2039c0cf5487ee6
-
SHA1
98cad76cefb6385645ed5744227dbc5d52946f01
-
SHA256
9ae767f752027fc744992be99d86270d653f68612269c837ad9ee3257c16b89b
-
SHA512
6545781e5eee6eb9ec23d448b180a1d11cc0cab1ff8470f75dfcd2b67add014687010195274331813c514e60a16c409e7613bf6d083eb1d30cd12b453cf2a590
-
SSDEEP
3072:AzIV/QAWbnTnlVctP1ZkQd7q17/r5Bapo9Vf789707v6hWNycUJF+G2M8:AUVYLTlatPjx7q1v5BgoDf7emvlI+R
Malware Config
Signatures
Files
-
9ae767f752027fc744992be99d86270d653f68612269c837ad9ee3257c16b89b.exe windows x86
9f93e884dadcff9fb60cd5eda3e23bd3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
IsBadReadPtr
CreateMutexA
EnumResourceTypesW
FindClose
FreeConsole
LocalFree
VirtualProtectEx
GlobalUnlock
IsDebuggerPresent
GetConsoleTitleA
LoadLibraryExW
GetLastError
GetStdHandle
GetSystemTime
CancelIo
GetModuleHandleA
CreateEventA
GlobalLock
lstrlenA
user32
LoadCursorA
GetParent
GetMessageA
IsIconic
CreateWindowExA
EnumWindows
DialogBoxParamA
GetDlgItemTextA
EndDialog
IsMenu
GetKeyState
GetMessageA
GetSubMenu
MessageBoxA
clbcatq
GetCatalogObject
ComPlusMigrate
GetComputerObject
SetSetupOpen
CheckMemoryGates
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ