Static task
static1
Behavioral task
behavioral1
Sample
9d1e8c33c3950f728b7fca446cf81474229b6310a6dd13d5cfd591453eed8d7f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9d1e8c33c3950f728b7fca446cf81474229b6310a6dd13d5cfd591453eed8d7f.exe
Resource
win10v2004-20220812-en
General
-
Target
9d1e8c33c3950f728b7fca446cf81474229b6310a6dd13d5cfd591453eed8d7f
-
Size
26KB
-
MD5
59747c5a62244d2869a5cc5b829c95ab
-
SHA1
f2fe4dda5dd9ed2ad861b109c461b456564d59a4
-
SHA256
9d1e8c33c3950f728b7fca446cf81474229b6310a6dd13d5cfd591453eed8d7f
-
SHA512
d36ac930cc48918233f8205735def87cab52271187e8ecdf90617077e604292fb8cdeb4df37a4c2938efc10a8d2616076a1685183e731a2434454240ad409486
-
SSDEEP
384:qnirBVPB2irNJqZXe7K/sigtfZ68Vj5aJEXGckuSwTIPTkgL84NthevlbYoyDyN8:fKKJqZo/h5s8VLGcRSgIbmryDc
Malware Config
Signatures
Files
-
9d1e8c33c3950f728b7fca446cf81474229b6310a6dd13d5cfd591453eed8d7f.exe windows x86
21d477a391bcbda5090da9dce140ddd4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FatalAppExitW
WriteConsoleOutputCharacterA
VirtualQuery
GetConsoleCommandHistoryLengthA
SystemTimeToFileTime
GetConsoleCursorMode
GetEnvironmentVariableA
MultiByteToWideChar
GetPrivateProfileSectionA
GetEnvironmentStringsA
EnumResourceNamesA
GetCurrentThreadId
SetThreadUILanguage
GetSystemDefaultLangID
GetVolumePathNameA
OpenProcess
GetFileAttributesA
ReplaceFileA
IsValidLocale
MapViewOfFile
GetVersionExA
HeapAlloc
GetFileType
GetModuleHandleA
GetStdHandle
GetConsoleCursorInfo
SetCalendarInfoA
GetLastError
UnlockFileEx
DeleteTimerQueueTimer
GetCurrentProcess
DisconnectNamedPipe
SetEndOfFile
GetFileSize
MoveFileExW
GetComputerNameA
GetProcessHeap
SetHandleInformation
GetProcessHandleCount
IsBadStringPtrA
WriteConsoleOutputA
GetSystemDefaultUILanguage
IsSystemResumeAutomatic
MoveFileExA
GetCompressedFileSizeA
GlobalFix
GetThreadLocale
SetTimerQueueTimer
VirtualAlloc
GlobalMemoryStatusEx
GetEnvironmentVariableA
GetProcessHeaps
CreateNamedPipeA
GetProcessVersion
GetNamedPipeInfo
SetFileShortNameA
GetFileSizeEx
GetLocaleInfoA
GetLocaleInfoA
GetVolumePathNamesForVolumeNameA
SetCommMask
ReadConsoleA
WriteConsoleInputA
GetTempPathA
SetProcessWorkingSetSize
RemoveDirectoryA
GetCurrentDirectoryA
user32
DestroyWindow
shlwapi
PathAddBackslashW
advapi32
AddAccessAllowedAceEx
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 15KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ