Static task
static1
Behavioral task
behavioral1
Sample
9ee3c0fab892bcd875af07f26e6b77a003a5640094149107cbe8c99855a8a648.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9ee3c0fab892bcd875af07f26e6b77a003a5640094149107cbe8c99855a8a648.exe
Resource
win10v2004-20220901-en
General
-
Target
9ee3c0fab892bcd875af07f26e6b77a003a5640094149107cbe8c99855a8a648
-
Size
280KB
-
MD5
60405098b442e3b560e90be204737750
-
SHA1
381250f1b2410f0b513b15ae4ea6333d6e7746f4
-
SHA256
9ee3c0fab892bcd875af07f26e6b77a003a5640094149107cbe8c99855a8a648
-
SHA512
b503a151d75aa82c8365d4b0c98d6c371017570c06689c251164059ec4cc755fca0c958bf8405b0fe56e9619d54986a5c15a8855f23d8c8da2d375fc46767c29
-
SSDEEP
6144:nXKbwzkHZNSEiqay+qjiiutshpHoiptSBLpgo:aUY5+VioZBJ
Malware Config
Signatures
Files
-
9ee3c0fab892bcd875af07f26e6b77a003a5640094149107cbe8c99855a8a648.exe windows x86
1d0d0903d16a2e97ef023a493b153209
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
SetLastError
QueryPerformanceCounter
GetSystemTimeAsFileTime
FindResourceW
GetCurrentProcessId
HeapAlloc
GetLocalTime
GetProcessHeap
MultiByteToWideChar
HeapFree
lstrcmpA
SystemTimeToFileTime
GetTickCount
WideCharToMultiByte
LoadLibraryA
CreateFileA
GetCurrentProcess
lstrcpyW
lstrlenW
CloseHandle
GetLocaleInfoW
SetUnhandledExceptionFilter
fmifs
Extend
EnableVolumeCompression
FormatEx
DiskCopy
Format
ComputeFmMediaType
Chkdsk
w32topl
ToplScheduleCreate
ToplSTHeapInit
ToplScheduleExportReadonly
ToplScheduleCacheDestroy
ToplScheduleDuration
ToplSTHeapExtractMin
ToplSTHeapDestroy
ToplScheduleCacheCreate
Sections
.text Size: 270KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ