Static task
static1
Behavioral task
behavioral1
Sample
a9a5593de0b21813618d002284eb917ec7940ab7a0b33982000545fceb7d5fa4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a9a5593de0b21813618d002284eb917ec7940ab7a0b33982000545fceb7d5fa4.exe
Resource
win10v2004-20220901-en
General
-
Target
a9a5593de0b21813618d002284eb917ec7940ab7a0b33982000545fceb7d5fa4
-
Size
24KB
-
MD5
3d62bb59e30ce7ce009b3688e8198a76
-
SHA1
5cffd00419fdee568df702342ca6522c9cfeb0f3
-
SHA256
a9a5593de0b21813618d002284eb917ec7940ab7a0b33982000545fceb7d5fa4
-
SHA512
c12a51692ff80f2d917dfcf9f922d71c449f434f141c52adf31c5ae3e3fd19af2606bd19d46ca7012111e99e8a57c9779dfaa82433d9c0e6fa82cf8e2563796e
-
SSDEEP
192:wWGBiAvDp7IxkcHHgZyETjyooJppSQsDaM/OyKQ4limw:wWGB772kcHXPoobpSQzURKQvmw
Malware Config
Signatures
Files
-
a9a5593de0b21813618d002284eb917ec7940ab7a0b33982000545fceb7d5fa4.exe windows x86
337cc185fcf958ad40d69864a7fe3a1a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpyA
lstrlenA
GetModuleFileNameA
SetThreadPriority
GetCurrentThread
GetLastError
CreateEventA
GetStartupInfoA
ExitProcess
GetCommandLineA
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
LeaveCriticalSection
EnterCriticalSection
LocalFree
GetVersionExA
user32
PeekMessageA
UnhookWindowsHookEx
DispatchMessageA
TranslateMessage
PostQuitMessage
CreateWindowExA
RegisterClassExA
SetWindowsHookExA
CharNextA
GetMessageA
DefWindowProcA
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 702B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ