Static task
static1
Behavioral task
behavioral1
Sample
509d34de9505365cd0af575a2578af77b3da5edf8632b8dd1ebfb4c839049edc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
509d34de9505365cd0af575a2578af77b3da5edf8632b8dd1ebfb4c839049edc.exe
Resource
win10v2004-20220812-en
General
-
Target
509d34de9505365cd0af575a2578af77b3da5edf8632b8dd1ebfb4c839049edc
-
Size
354KB
-
MD5
4e46ccd7efa003ad196de8a2a44e847d
-
SHA1
57687d395204c75d33feb660a957f905695a667d
-
SHA256
509d34de9505365cd0af575a2578af77b3da5edf8632b8dd1ebfb4c839049edc
-
SHA512
37f97c39a57671533b83348994650a88148754841de24459cfbfdb7ab8ce63e9ad36c226ffb460dab0a28f88049c6f390fa93a853365719b9cf0ca47320efdc4
-
SSDEEP
6144:I/aVyLRUEj0JUjPt44tAWlUiYJ9vzhNFgGv6NY5jgtxDdBl/b:O8NdWlUTXFoNYZGl/b
Malware Config
Signatures
Files
-
509d34de9505365cd0af575a2578af77b3da5edf8632b8dd1ebfb4c839049edc.exe windows x86
2f0c742bdab9e76101e9809e36e2e269
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
FlushConsoleInputBuffer
GetLocaleInfoA
GetACP
WriteProcessMemory
GlobalAlloc
UnhandledExceptionFilter
GetCommProperties
HeapReAlloc
OpenSemaphoreA
GetLogicalDrives
GetCommModemStatus
FindNextFileW
AllocConsole
EnumResourceLanguagesW
WriteConsoleW
FlushInstructionCache
WriteConsoleA
GetConsoleMode
GetVolumeInformationA
FreeEnvironmentStringsA
SetSystemTime
FindCloseChangeNotification
GlobalSize
TerminateThread
PostQueuedCompletionStatus
CreateFileMappingA
BeginUpdateResourceA
InitializeCriticalSection
EnumSystemLocalesA
WriteConsoleOutputCharacterA
InterlockedExchangeAdd
GetDiskFreeSpaceW
GetTempFileNameA
FindFirstChangeNotificationW
GetCommTimeouts
DefineDosDeviceA
IsBadStringPtrW
GlobalLock
GetTickCount
FindFirstFileW
TlsAlloc
SetConsoleCursorPosition
InterlockedDecrement
LoadLibraryExW
GlobalGetAtomNameW
ScrollConsoleScreenBufferA
ole32
CoGetCallContext
OleTranslateAccelerator
CoMarshalInterface
CreateILockBytesOnHGlobal
user32
wsprintfA
InsertMenuItemA
InternalGetWindowText
DestroyIcon
CountClipboardFormats
RegisterDeviceNotificationA
CopyAcceleratorTableW
SetWinEventHook
ToUnicode
SetCursorPos
LoadCursorA
GetActiveWindow
FillRect
BeginPaint
CharPrevA
OpenWindowStationW
advapi32
GetLengthSid
GetSidIdentifierAuthority
RegQueryValueExA
SetEntriesInAclW
AbortSystemShutdownA
SetTokenInformation
AddAce
CryptCreateHash
RegOpenKeyExW
RegOpenKeyW
NotifyBootConfigStatus
CryptGetProvParam
RegQueryValueA
GetUserNameW
AdjustTokenPrivileges
ImpersonateSelf
ImpersonateNamedPipeClient
GetSidLengthRequired
shell32
SHGetDesktopFolder
SHGetPathFromIDListA
CommandLineToArgvW
SHBrowseForFolderA
Sections
.text Size: 40KB - Virtual size: 357KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 286KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ