Static task
static1
Behavioral task
behavioral1
Sample
9b5d09da604beb21c2a3b2cdb903b1fe3f8c6e64275d43b61f61570e07a771a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b5d09da604beb21c2a3b2cdb903b1fe3f8c6e64275d43b61f61570e07a771a0.exe
Resource
win10v2004-20220812-en
General
-
Target
9b5d09da604beb21c2a3b2cdb903b1fe3f8c6e64275d43b61f61570e07a771a0
-
Size
89KB
-
MD5
07b5457a485780da27f4c1ed3a6d4931
-
SHA1
0d4fe93abba9c520c8d47cf4dd728c6c10c95c43
-
SHA256
9b5d09da604beb21c2a3b2cdb903b1fe3f8c6e64275d43b61f61570e07a771a0
-
SHA512
7337a67dfc36c168df490932e21b905ef9cb1d4649da4dc2b792a7d6b6cdac847eba45d8bd6610af813afd759c54414d5665edb568d476bb3b57bc43227d7838
-
SSDEEP
1536:BwKhaIQ/AnNxAiiJvffxZuAdzkJcMCRo4P+2:fwAN+i+JZuAlkiMu1
Malware Config
Signatures
Files
-
9b5d09da604beb21c2a3b2cdb903b1fe3f8c6e64275d43b61f61570e07a771a0.exe windows x86
11f517a13eebbf03c26e2a6d082d6321
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetTickCount
CloseHandle
ReleaseMutex
GetVolumeInformationA
Sleep
GetComputerNameA
SearchPathA
SetLastError
CreateMutexA
DeleteCriticalSection
FindClose
GetDriveTypeA
TlsGetValue
FreeConsole
GetLastError
GetExitCodeProcess
GetCommandLineA
EnumResourceTypesA
GetModuleHandleA
shell32
DragFinish
SHGetDiskFreeSpaceA
DragAcceptFiles
DragQueryPoint
SHGetSettings
SHGetMalloc
SheChangeDirA
ShellAboutA
DragQueryFileA
StrChrA
SHGetNewLinkInfo
SHFree
SHAlloc
ShellMessageBoxA
glmf32
glsBinary
glsComment
glsAppRef
glsChannel
glsBlock
user32
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE