Static task
static1
Behavioral task
behavioral1
Sample
9ee2c23caee6c56ecba759c8821cceb2620e7e2ad7535fe4f616d35e33a6843a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ee2c23caee6c56ecba759c8821cceb2620e7e2ad7535fe4f616d35e33a6843a.exe
Resource
win10v2004-20220812-en
General
-
Target
9ee2c23caee6c56ecba759c8821cceb2620e7e2ad7535fe4f616d35e33a6843a
-
Size
18KB
-
MD5
03a2aec20411b2ba83f18747a8b2933f
-
SHA1
d7178a8075ae077c5ad926bc25e6d27a524371a4
-
SHA256
9ee2c23caee6c56ecba759c8821cceb2620e7e2ad7535fe4f616d35e33a6843a
-
SHA512
7838ea0520a7c0cca84d2572d180f39ef7c6873b9cbe001426aca69d65972992431d4d2054e8f0a69c0470beb591f0837ebdd241e08bf4a02ccd580b788ae9a3
-
SSDEEP
384:/sm8r9A9wc9m0hBvIqKSYDjnX4RznMxalwAS:Umc9A++GvjqnQ7
Malware Config
Signatures
Files
-
9ee2c23caee6c56ecba759c8821cceb2620e7e2ad7535fe4f616d35e33a6843a.exe windows x86
0c8bccc9e77b540df5fadcbe963cbaeb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
ExitProcess
GetModuleFileNameA
GetModuleHandleA
GlobalAlloc
GlobalLock
WriteFile
ReadFile
CloseHandle
SetFilePointer
CreateFileA
GetFileType
GetStartupInfoA
GetStdHandle
GetCommandLineA
SetUnhandledExceptionFilter
SetConsoleCursorPosition
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleCursorInfo
GetConsoleScreenBufferInfo
GetNumberOfConsoleInputEvents
GetVersionExA
ReadConsoleInputA
ScrollConsoleScreenBufferA
WriteConsoleOutputA
CreateFileA
Sleep
GetStdHandle
FreeLibrary
GetVersionExA
LoadLibraryA
GetProcAddress
user32
MessageBoxA
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 260KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE