Static task
static1
Behavioral task
behavioral1
Sample
a9051ba2d39f3b9078edae20840dff3c1b5636754623a6102dbb5a29e4b0e622.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a9051ba2d39f3b9078edae20840dff3c1b5636754623a6102dbb5a29e4b0e622.exe
Resource
win10v2004-20220812-en
General
-
Target
a9051ba2d39f3b9078edae20840dff3c1b5636754623a6102dbb5a29e4b0e622
-
Size
936KB
-
MD5
3200eeb1cc704ace8ec53d786291c7b0
-
SHA1
dbf7b1cd9c564faf0e1e7702530bcf3075c629a3
-
SHA256
a9051ba2d39f3b9078edae20840dff3c1b5636754623a6102dbb5a29e4b0e622
-
SHA512
1d226d48f1f8a7e72ab7605a2910eab0207397cabbdf8061b20556a9fd486a255b57d3f335ab30ad45790873cba10d33f9a9b86b71a9cfa5a7cacd1629284308
-
SSDEEP
12288:UVU8chBnroKCiiauuJQCxyWoMgaNOWXy/N1gXz/ox5ZEv:UFcByW7gaNOWkLgD8Y
Malware Config
Signatures
Files
-
a9051ba2d39f3b9078edae20840dff3c1b5636754623a6102dbb5a29e4b0e622.exe windows x86
329b190bfe054353d35a5d82fc60cf22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetLogicalDrives
CreateMutexA
GetCurrentProcessId
ExitProcess
TerminateProcess
OpenProcess
GetModuleFileNameA
Sleep
CopyFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateThread
CreateFileW
GetConsoleCP
GetFullPathNameW
GetFileAttributesA
FindNextFileW
FindFirstFileExW
FindClose
MoveFileA
lstrcmpiA
CloseHandle
WriteFile
SetFilePointerEx
SetEndOfFile
ReadFile
GetFileSizeEx
OpenMutexA
CreateFileA
FlushFileBuffers
ReadConsoleW
GetConsoleMode
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
EncodePointer
GetModuleHandleExW
HeapValidate
GetSystemInfo
GetStdHandle
GetACP
GetStringTypeW
GetCurrentThread
GetFileType
OutputDebugStringA
OutputDebugStringW
WriteConsoleW
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
HeapReAlloc
HeapQueryInformation
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
DecodePointer
user32
wsprintfA
advapi32
CryptEncrypt
CryptImportKey
CryptExportKey
CryptSetKeyParam
CryptDestroyKey
CryptGenKey
CryptAcquireContextA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
CryptDecrypt
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
Sections
.text Size: 704KB - Virtual size: 700KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 4KB - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ