Static task
static1
Behavioral task
behavioral1
Sample
9f432abb8e2dfda79bca0da2de7010977a6dbfbfc32a71eb7cc56e07265c0320.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f432abb8e2dfda79bca0da2de7010977a6dbfbfc32a71eb7cc56e07265c0320.exe
Resource
win10v2004-20220812-en
General
-
Target
9f432abb8e2dfda79bca0da2de7010977a6dbfbfc32a71eb7cc56e07265c0320
-
Size
92KB
-
MD5
66b56644f887f7ee8799f2db485b0eb0
-
SHA1
3d987bd5b69e549fd8c1cfb25c1a4fd72ba9106d
-
SHA256
9f432abb8e2dfda79bca0da2de7010977a6dbfbfc32a71eb7cc56e07265c0320
-
SHA512
18b5c64b6a9f3b043ba281af8a3f18e63282df8f620794bbf9e84f2cfd197a2ba36c92c1ca286b939bd618de83a1ea3d108ad947624a00fcbe70cafc81bd1716
-
SSDEEP
1536:E5LFHWjMfnTWyKILvYeL+rLOOGtWGlNKkNH3d2o:E5ZHWjMfT9N5qytplYE3d2o
Malware Config
Signatures
Files
-
9f432abb8e2dfda79bca0da2de7010977a6dbfbfc32a71eb7cc56e07265c0320.exe windows x86
1f07098ac4730a7eba05457942a46b13
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetTickCount
VirtualAlloc
ExitProcess
WriteFile
GetCommandLineA
GetProcAddress
LoadLibraryA
VirtualFree
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
HeapReAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
HeapFree
HeapCreate
LCMapStringW
SetErrorMode
GetModuleHandleA
GetCommandLineW
VirtualProtect
CreateFileA
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
user32
GetSystemMetrics
RegisterClassExA
CreateWindowExA
ole32
CoTaskMemAlloc
Sections
.text Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE