Static task
static1
Behavioral task
behavioral1
Sample
9a399d1a5ecec9c72a5190d3f91d3c601ede0605894c1bf4f735129c2886a0ce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a399d1a5ecec9c72a5190d3f91d3c601ede0605894c1bf4f735129c2886a0ce.exe
Resource
win10v2004-20220812-en
General
-
Target
9a399d1a5ecec9c72a5190d3f91d3c601ede0605894c1bf4f735129c2886a0ce
-
Size
77KB
-
MD5
4592419ceab8ae5773e868cdeed39420
-
SHA1
ec7ecd772d48ffad5f8695418cdf0c8b1fe703e2
-
SHA256
9a399d1a5ecec9c72a5190d3f91d3c601ede0605894c1bf4f735129c2886a0ce
-
SHA512
af8c512a8b925cb538b7f518f27133d486d0f4055587882e6254f48cbd575123ed6e2234761c8672ec9812bb9571b1a8680295f3b9d8d6a5dbbf3780500b2e78
-
SSDEEP
1536:oNAnmsxMCHhvcONcJLLjcau+0H2b733Yr5ioe:omm4J3iYX7H2b733A9e
Malware Config
Signatures
Files
-
9a399d1a5ecec9c72a5190d3f91d3c601ede0605894c1bf4f735129c2886a0ce.exe windows x86
11fd8c42b12ef54391eba608299ead0d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
GetModuleHandleA
LoadResource
GetDiskFreeSpaceA
LCMapStringW
GetTempFileNameA
IsBadReadPtr
GetThreadLocale
GetSystemDirectoryW
SetLastError
DeleteFileA
GetCurrentThread
RtlMoveMemory
GetFileAttributesA
lstrcmpiA
GetWindowsDirectoryA
GetTempPathA
GetOEMCP
GetModuleHandleW
GetLocalTime
GetLocaleInfoA
VirtualProtect
InterlockedCompareExchange
GetProcAddress
UnhandledExceptionFilter
GetExitCodeProcess
GetStartupInfoA
SizeofResource
GetSystemInfo
GetDriveTypeA
msvcrt
_initterm
__p__fmode
__p__commode
__set_app_type
_XcptFilter
__p___initenv
_except_handler3
__getmainargs
_exit
_controlfp
_adjust_fdiv
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ