Static task
static1
Behavioral task
behavioral1
Sample
9325e68cf2dc01481781e033b48fd008b0eff3d225818d9252531f323fd0666f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9325e68cf2dc01481781e033b48fd008b0eff3d225818d9252531f323fd0666f.exe
Resource
win10v2004-20220901-en
General
-
Target
9325e68cf2dc01481781e033b48fd008b0eff3d225818d9252531f323fd0666f
-
Size
187KB
-
MD5
1307304659ed70136c97960791741b4f
-
SHA1
c552ca293aeeae343efc2c4dd5ec5525fa16aac6
-
SHA256
9325e68cf2dc01481781e033b48fd008b0eff3d225818d9252531f323fd0666f
-
SHA512
6681e18c5f0d3b7e7551c4a4573ff5df7e25e0de65454de6ca5f84aee3e43994cdc58ad22f539b973c130db2781c9276ace469a051e710c588c5d44698ba09e5
-
SSDEEP
3072:+xbnkOSiUOlKINlf8lQ8bO9dMeR7v1L5qDNSO91ha41QKondgm9yurR0:ATEOlKI38lQ/9d1T1An1hF+gerG
Malware Config
Signatures
Files
-
9325e68cf2dc01481781e033b48fd008b0eff3d225818d9252531f323fd0666f.exe windows x86
c0f650b8e045078501b172795be63f75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathW
kernel32
GetVersionExA
WideCharToMultiByte
GetTempPathW
WriteFile
lstrlenA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
FreeLibrary
GetProcAddress
LoadLibraryA
LoadLibraryW
GetTickCount
GetTempPathA
ResetEvent
WaitForSingleObject
SetEvent
Sleep
GetTimeZoneInformation
FileTimeToSystemTime
OutputDebugStringA
lstrcpyA
GetFullPathNameA
GetFullPathNameW
IsDBCSLeadByte
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
InterlockedExchange
GetDiskFreeSpaceExA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateSemaphoreA
ole32
CoCreateObjectInContext
OleIsCurrentClipboard
GetErrorInfo
CoTaskMemFree
CoTaskMemAlloc
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 62B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ