Static task
static1
Behavioral task
behavioral1
Sample
9883e9045d5207769b071cad5d98cc26aa631c30c1eaf83e3d124c7b40a44053.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9883e9045d5207769b071cad5d98cc26aa631c30c1eaf83e3d124c7b40a44053.exe
Resource
win10v2004-20220812-en
General
-
Target
9883e9045d5207769b071cad5d98cc26aa631c30c1eaf83e3d124c7b40a44053
-
Size
140KB
-
MD5
21961afbbfb88b5402f410d9f5ec686f
-
SHA1
f63dd1ef4f92ae2c43c8141f9055ba5f27f19d5d
-
SHA256
9883e9045d5207769b071cad5d98cc26aa631c30c1eaf83e3d124c7b40a44053
-
SHA512
f4300ac090871c81a0f9c816d4d587cd78c050d75600bd708245b76b071feacc67dff2ac5268b1e60dbd4f510c20a013432a47dc68f9585499853a5f8b90091c
-
SSDEEP
1536:000IOPJ0GsRfcpMUFrH8T+HQnzgS/TrSymhDbAWkwlgk84CfHl1ilquc4p:yPex0c4QzTajbnkwlguCfHl1anJp
Malware Config
Signatures
Files
-
9883e9045d5207769b071cad5d98cc26aa631c30c1eaf83e3d124c7b40a44053.exe windows x86
9f3a302a42cced25d4572f6e5ac55ee7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetPrivateProfileSectionA
SetEndOfFile
UnmapViewOfFile
VirtualFree
SetFilePointer
GetProcAddress
LoadLibraryA
GetModuleHandleA
InterlockedDecrement
FindClose
FindFirstFileA
CloseHandle
OpenMutexA
GetVolumeInformationA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
GetSystemDirectoryA
WaitForSingleObject
CreateProcessA
GetACP
GetTickCount
WriteFile
CreateFileA
DeleteFileA
SetFileAttributesA
ReadFile
DeviceIoControl
GetModuleFileNameA
GetSystemTimeAsFileTime
lstrlenA
InterlockedIncrement
GetLocaleInfoW
GetFileSize
InterlockedExchange
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
EnterCriticalSection
LeaveCriticalSection
HeapFree
RtlUnwind
GetFileAttributesA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
HeapAlloc
VirtualQuery
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
HeapSize
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
FlushFileBuffers
GetOEMCP
GetCPInfo
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
SetStdHandle
MultiByteToWideChar
VirtualProtect
GetSystemInfo
gdi32
GetTextCharsetInfo
wininet
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenUrlA
DeleteUrlCacheEntry
InternetReadFile
InternetOpenA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ