Static task
static1
Behavioral task
behavioral1
Sample
a9fbbe4aa079656d4025a7d0fbc771d175a2cd134d985548739c628c71d3b702.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a9fbbe4aa079656d4025a7d0fbc771d175a2cd134d985548739c628c71d3b702.exe
Resource
win10v2004-20220812-en
General
-
Target
a9fbbe4aa079656d4025a7d0fbc771d175a2cd134d985548739c628c71d3b702
-
Size
60KB
-
MD5
005f73b2b297960b12f79732b76d18a8
-
SHA1
09558a672d49c78eefcaba356a5d4dedf8b16ac5
-
SHA256
a9fbbe4aa079656d4025a7d0fbc771d175a2cd134d985548739c628c71d3b702
-
SHA512
7e963629184d988a37f80dc6aa81a468ff179dc2d33c83f8e77fc0421d6be7ef652b1093ff0ab48567b96fd3b141f31cfe9fb878bdc4324ba94084d0c7352f7b
-
SSDEEP
1536:64FfdTHoXTuY+yYcKQ/6yTsAtRkVw+MyEcQrk:64FfJUuY+3ct/6yThQ9uY
Malware Config
Signatures
Files
-
a9fbbe4aa079656d4025a7d0fbc771d175a2cd134d985548739c628c71d3b702.exe windows x86
1501b268b56121d38b04943a42a8f939
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ClearCommBreak
CreateFileA
VirtualAllocEx
RemoveDirectoryA
OpenEventW
GetTickCount
GetFileAttributesA
GetModuleHandleA
OpenProcess
GetCommandLineW
ExitProcess
ReleaseMutex
DeleteFileA
HeapSize
GetStartupInfoA
SetEvent
ResetEvent
SetLastError
GetEnvironmentVariableW
SetConsoleCP
WriteConsoleA
user32
FindWindowA
GetCursorInfo
GetSysColor
PeekMessageA
DispatchMessageW
GetDC
GetCaretPos
CallWindowProcW
DispatchMessageW
GetClassInfoA
GetWindowLongA
GetKeyState
GetDC
linkinfo
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pedwryo Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE