Static task
static1
Behavioral task
behavioral1
Sample
0a9055069ba77131b627b07812b2e5cb84c5422357e4398a99090c9f354f9f1a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a9055069ba77131b627b07812b2e5cb84c5422357e4398a99090c9f354f9f1a.exe
Resource
win10v2004-20220812-en
General
-
Target
0a9055069ba77131b627b07812b2e5cb84c5422357e4398a99090c9f354f9f1a
-
Size
136KB
-
MD5
1c70e42e4be7bddf71949772e8633cbc
-
SHA1
8f0b97156c00af15e0175e03508dab1c57f7e4c4
-
SHA256
0a9055069ba77131b627b07812b2e5cb84c5422357e4398a99090c9f354f9f1a
-
SHA512
2efd5bfc096dc3951f880275a743c44da5f5e8190a0689bc4d94d3794785e9760c4e19898f6e4d653c7a22bdc176fbe1195ce2e22ddfc839dc9475d4f5551d93
-
SSDEEP
3072:UIWfLe3TT6bbT856/VhEytVVBBBBBBBBB7o:UIWfLeD8bT3hJTo
Malware Config
Signatures
Files
-
0a9055069ba77131b627b07812b2e5cb84c5422357e4398a99090c9f354f9f1a.exe windows x86
15d14576c97edd952ae2e7acdb9205b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
FindClose
FindFirstFileW
GetSystemDirectoryW
CreateProcessW
CloseHandle
FreeLibrary
SetCurrentDirectoryW
GetCurrentDirectoryW
FlushFileBuffers
CreateFileA
GetVersionExW
GetModuleHandleW
GetProcAddress
GetUserDefaultUILanguage
WaitForSingleObject
MultiByteToWideChar
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetLastError
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
WideCharToMultiByte
LCMapStringW
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
Sleep
HeapSize
SetFilePointer
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
LoadStringW
MessageBoxW
wsprintfW
advapi32
RegEnumValueW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyW
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ