Static task
static1
Behavioral task
behavioral1
Sample
9fe5f7c87144d271ce99c8c9cbbbf38fc945fa7cfba62b6383f4a070e9319d4d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9fe5f7c87144d271ce99c8c9cbbbf38fc945fa7cfba62b6383f4a070e9319d4d.exe
Resource
win10v2004-20220812-en
General
-
Target
9fe5f7c87144d271ce99c8c9cbbbf38fc945fa7cfba62b6383f4a070e9319d4d
-
Size
206KB
-
MD5
6d492452ceb49fb237e9e7e3d7c5264c
-
SHA1
4e8c5543eee7cd0e832bfd4109547bb07dba0760
-
SHA256
9fe5f7c87144d271ce99c8c9cbbbf38fc945fa7cfba62b6383f4a070e9319d4d
-
SHA512
e34aa31b9649a247ff014d93a51e138b84d5af79bb2c10da9763bca6323ced34de061c8496e99904e7ca520f70ce71d52657b17ec3e664d8e12d9cb5d3e74d11
-
SSDEEP
3072:pxkldjAXzvxoX00IpD+AZFmOZt3y/d6kWmoMhl6Dht2Rzo2f3SY/JOQt0pfv:puldjKTqX01p6AZd3u5dRzH6Yopfv
Malware Config
Signatures
Files
-
9fe5f7c87144d271ce99c8c9cbbbf38fc945fa7cfba62b6383f4a070e9319d4d.exe windows x86
532ff103310bd6856027ca068048b896
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
HeapReAlloc
HeapAlloc
HeapFree
VirtualAlloc
ReadDirectoryChangesW
SetConsoleOutputCP
GetConsoleTitleA
GetLongPathNameW
LoadResource
SetCriticalSectionSpinCount
WriteProfileStringA
lstrlenA
FreeResource
LocalAlloc
EnumCalendarInfoExW
ConnectNamedPipe
EnumResourceLanguagesA
GlobalFree
FindNextChangeNotification
FindNextFileA
LoadLibraryExA
lstrcpynA
ResetWriteWatch
SetCurrentDirectoryA
GetCalendarInfoA
LocalCompact
SetConsoleWindowInfo
GetCurrentDirectoryW
SetComputerNameA
Thread32Next
VirtualQueryEx
GetStartupInfoA
GlobalFindAtomW
lstrcmp
ReadConsoleOutputCharacterW
WaitForSingleObject
WideCharToMultiByte
WriteConsoleOutputAttribute
CreateDirectoryW
FindResourceExA
GetStringTypeExW
OpenMutexW
MulDiv
TlsSetValue
GetExitCodeProcess
CreateThread
FreeEnvironmentStringsW
SetThreadExecutionState
LoadLibraryExW
FlushConsoleInputBuffer
FindClose
SetVolumeLabelW
SetSystemTimeAdjustment
PeekNamedPipe
FormatMessageW
GetThreadPriorityBoost
LocalHandle
InitAtomTable
GetSystemTimeAdjustment
GetStringTypeW
MapViewOfFile
SetConsoleCtrlHandler
LockFileEx
UpdateResourceA
Heap32Next
CreateConsoleScreenBuffer
WriteFileGather
ReadConsoleOutputAttribute
lstrcpynW
OpenSemaphoreW
GetSystemDirectoryA
WritePrivateProfileStringW
GetNumberOfConsoleMouseButtons
RemoveDirectoryA
GlobalUnfix
GetThreadContext
OpenMutexA
HeapCompact
SetCurrentDirectoryW
GetFileInformationByHandle
SetConsoleTitleW
GetPrivateProfileStringA
WaitNamedPipeW
GetThreadPriority
VirtualAllocEx
GetCalendarInfoW
CreateWaitableTimerW
GetNumberOfConsoleInputEvents
VirtualUnlock
SetConsoleCP
EnumCalendarInfoExA
GetComputerNameA
LoadModule
WritePrivateProfileStringA
OpenFileMappingA
ReadConsoleOutputA
FindResourceExW
DeleteAtom
GetPrivateProfileStructA
VirtualFreeEx
Module32First
Thread32First
GetVolumeInformationW
GetStringTypeA
GetModuleFileNameW
SetPriorityClass
CreateNamedPipeW
GetEnvironmentStringsA
GetProfileStringA
GetVersionExA
MoveFileExW
SetLocaleInfoW
FindFirstChangeNotificationA
GetSystemDirectoryW
LockFile
GetWindowsDirectoryW
SetConsoleTitleA
GetCurrentDirectoryA
GetConsoleMode
WriteProfileStringW
WriteFile
UnmapViewOfFile
GetSystemPowerStatus
WritePrivateProfileSectionW
MultiByteToWideChar
DefineDosDeviceW
EnterCriticalSection
CreateTapePartition
EnumSystemLocalesA
GetSystemInfo
GetFileTime
GetPrivateProfileStructW
TlsAlloc
ReadFileEx
GetLargestConsoleWindowSize
InterlockedExchangeAdd
EnumSystemCodePagesA
BeginUpdateResourceA
GetFileSize
GetConsoleScreenBufferInfo
GetProfileSectionA
IsValidLocale
AllocConsole
SetLocaleInfoA
HeapUnlock
GetPrivateProfileIntW
GetConsoleCP
MapViewOfFileEx
EnumDateFormatsW
GetUserDefaultLangID
FreeConsole
GetProcessAffinityMask
TransactNamedPipe
DeleteFileW
CommConfigDialogW
EnumCalendarInfoA
WaitNamedPipeA
DeleteCriticalSection
InterlockedCompareExchange
GetPriorityClass
ReadConsoleInputA
FindFirstFileExW
GetEnvironmentStringsW
GlobalAddAtomA
DeviceIoControl
ResumeThread
GetShortPathNameW
GetTimeZoneInformation
EnumSystemCodePagesW
FindFirstFileW
GetSystemDefaultLCID
GetDateFormatA
GetProcessHeaps
GetProfileIntW
GetTempPathW
GetCompressedFileSizeW
GetNamedPipeHandleStateW
GlobalUnWire
ReadFile
IsValidCodePage
SetEvent
PeekConsoleInputW
SetVolumeLabelA
GetThreadSelectorEntry
FileTimeToDosDateTime
SetThreadContext
LocalFileTimeToFileTime
WriteConsoleOutputCharacterW
FreeLibrary
SignalObjectAndWait
SetConsoleCursorInfo
FoldStringW
CreateToolhelp32Snapshot
GetConsoleCursorInfo
CreateEventA
LocalLock
HeapDestroy
CreateWaitableTimerA
GlobalHandle
WriteProfileSectionW
GlobalDeleteAtom
WaitForMultipleObjects
InitializeCriticalSectionAndSpinCount
GetLogicalDriveStringsA
CreateFileW
ContinueDebugEvent
OpenEventW
GetNamedPipeInfo
LocalUnlock
GetMailslotInfo
GetProcAddress
GetDiskFreeSpaceExW
OpenWaitableTimerW
GetWriteWatch
GetDateFormatW
CreateDirectoryExW
SetConsoleScreenBufferSize
GetCompressedFileSizeA
EraseTape
FillConsoleOutputCharacterA
GetTempPathA
DisableThreadLibraryCalls
SetEnvironmentVariableW
TerminateThread
SystemTimeToFileTime
GetUserDefaultLCID
LocalFlags
GetConsoleOutputCP
FindAtomA
GetVolumeInformationA
WriteConsoleOutputCharacterA
GetVersionExW
lstrcatW
GetCurrencyFormatA
GetNumberFormatA
OpenSemaphoreA
FindNextFileW
GetCurrentThread
GetSystemTime
WritePrivateProfileSectionA
SleepEx
lstrlenW
ReadConsoleA
RtlMoveMemory
RtlFillMemory
ResetEvent
GlobalFix
Process32Next
SystemTimeToTzSpecificLocalTime
GetFullPathNameW
LocalFree
OpenEventA
FlushFileBuffers
EnumDateFormatsA
UnhandledExceptionFilter
ExpandEnvironmentStringsA
OpenFile
HeapWalk
SetEnvironmentVariableA
lstrcpyn
EnumResourceNamesW
WriteConsoleOutputW
lstrlen
FindResourceW
WritePrivateProfileStructW
Sleep
MoveFileA
SetThreadPriorityBoost
GetDriveTypeW
WinExec
FreeLibraryAndExitThread
CreateMailslotW
ReadConsoleOutputCharacterA
GetEnvironmentVariableW
CreateMailslotA
GetFullPathNameA
GetPrivateProfileSectionW
Module32Next
VirtualProtectEx
WaitForMultipleObjectsEx
SetEndOfFile
Toolhelp32ReadProcessMemory
SetHandleCount
CreateSemaphoreW
PulseEvent
GetProfileStringW
GetProcessPriorityBoost
GetPrivateProfileSectionA
SetConsoleTextAttribute
CopyFileA
CreateDirectoryExA
SetThreadIdealProcessor
FoldStringA
FileTimeToSystemTime
CreateProcessA
GlobalFindAtomA
FindCloseChangeNotification
WaitForDebugEvent
DefineDosDeviceA
CreateNamedPipeA
SearchPathW
GetTempFileNameA
GetStdHandle
GetFileAttributesExA
SetFileTime
VirtualLock
FindFirstFileExA
CreateSemaphoreA
SetFilePointer
AddAtomW
MoveFileW
SuspendThread
GetPrivateProfileStringW
GetLogicalDrives
GetTempFileNameW
CreateMutexW
CommConfigDialogA
GetProcessVersion
VirtualProtect
Heap32ListNext
GetProcessShutdownParameters
EnumDateFormatsExA
GetStringTypeExA
GetStartupInfoW
InterlockedIncrement
LeaveCriticalSection
lstrcmpiW
FlushInstructionCache
EnumSystemLocalesW
EnumResourceTypesW
SetSystemTime
GetACP
TlsGetValue
ConvertDefaultLocale
GlobalWire
GlobalGetAtomNameA
lstrcpy
GetLogicalDriveStringsW
ReadConsoleW
GetDriveTypeA
lstrcpyA
FindAtomW
LocalShrink
GetAtomNameW
lstrcmpiA
DosDateTimeToFileTime
SetLocalTime
TransmitCommChar
FindResourceA
GetShortPathNameA
OpenWaitableTimerA
MoveFileExA
ReadFileScatter
PeekConsoleInputA
OutputDebugStringW
GlobalReAlloc
CompareFileTime
HeapSize
GetPrivateProfileSectionNamesW
GetComputerNameW
ReadProcessMemory
CreateProcessW
SetWaitableTimer
GetProfileIntA
GetEnvironmentVariableA
GlobalAddAtomW
SetComputerNameW
CreateDirectoryA
SetConsoleMode
HeapLock
GetPrivateProfileSectionNamesA
lstrcat
lstrcmpA
CreateEventW
GetTimeFormatW
GetDiskFreeSpaceW
LoadLibraryW
GetLongPathNameA
FillConsoleOutputCharacterW
GetVersion
DisconnectNamedPipe
CreateFileA
GetFileType
HeapCreate
GlobalLock
WriteConsoleInputW
GetFileAttributesW
FlushViewOfFile
GlobalGetAtomNameW
UnlockFile
GetEnvironmentStrings
SetTimeZoneInformation
DeleteFiber
UpdateResourceW
GetProcessHeap
GetDiskFreeSpaceExA
DeleteFileA
LocalReAlloc
UnlockFileEx
WaitCommEvent
EscapeCommFunction
InitializeCriticalSection
SetConsoleCursorPosition
GetHandleInformation
GetFileAttributesA
GetFileAttributesExW
BeginUpdateResourceW
GetLocalTime
SetFileAttributesW
GetNumberFormatW
ExpandEnvironmentStringsW
GetProcessTimes
EnumResourceTypesA
GetCurrencyFormatW
GetSystemDefaultLangID
comdlg32
GetFileTitleA
FindTextA
ChooseColorW
GetOpenFileNameA
LoadAlterBitmap
PageSetupDlgW
PrintDlgA
ReplaceTextA
ChooseColorA
ReplaceTextW
GetSaveFileNameA
FindTextW
GetFileTitleW
PrintDlgW
ChooseFontA
PageSetupDlgA
GetOpenFileNameW
ChooseFontW
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE