Static task
static1
Behavioral task
behavioral1
Sample
b9b4767da042136ff62fdeddd1762572ab55e787bc13e218907f86b6e0003271.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9b4767da042136ff62fdeddd1762572ab55e787bc13e218907f86b6e0003271.exe
Resource
win10v2004-20220812-en
General
-
Target
b9b4767da042136ff62fdeddd1762572ab55e787bc13e218907f86b6e0003271
-
Size
205KB
-
MD5
8415813de2d6ebf06a8d6f291b4f0caa
-
SHA1
5ec53cff55efe769fed94c439f64644a62d0becd
-
SHA256
b9b4767da042136ff62fdeddd1762572ab55e787bc13e218907f86b6e0003271
-
SHA512
1f2581445ef9b5fd8b802ec9309f5bf653f0ca9c85eb2d2a6c3647573f8cd77699030208be4b4f264801d87ee17267114fb47e9b7e40943f593d655264ae5c20
-
SSDEEP
3072:r6sncMXgul/slVLMquCXK3LpNrtWZRUmcxnTFAW6y3THw749ZgwZ+EsaeOmag6Y:r3FX998a3BWZu544MwZOLcg
Malware Config
Signatures
Files
-
b9b4767da042136ff62fdeddd1762572ab55e787bc13e218907f86b6e0003271.exe windows x86
329d38cdd4767be9db3613db28708b6e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
ExitProcess
GetModuleHandleA
GetProcAddress
lstrlenA
GetProcessHeap
HeapAlloc
GetVersionExA
HeapFree
FlushFileBuffers
GetConsoleMode
GetConsoleCP
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
WriteConsoleW
GetVersionExW
GetEnvironmentVariableW
GetTempPathW
GetModuleHandleW
CreateFileW
LoadLibraryExW
SetEvent
CreateThread
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
MoveFileExW
CreateDirectoryW
ole32
CoRegisterMallocSpy
StringFromGUID2
CLSIDFromString
winmm
timeEndPeriod
comdlg32
GetOpenFileNameA
shlwapi
StrStrA
Sections
.text Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ