Static task
static1
Behavioral task
behavioral1
Sample
9c54390d2afa7f113d472904abb6ba27cde08bddeb2cdd52d5aabfdc7872f744.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c54390d2afa7f113d472904abb6ba27cde08bddeb2cdd52d5aabfdc7872f744.exe
Resource
win10v2004-20220812-en
General
-
Target
9c54390d2afa7f113d472904abb6ba27cde08bddeb2cdd52d5aabfdc7872f744
-
Size
281KB
-
MD5
014fee65be9ab4940bcae786562b6bc0
-
SHA1
5e929ee986df7c21cc59fa330e4f8b6e13314235
-
SHA256
9c54390d2afa7f113d472904abb6ba27cde08bddeb2cdd52d5aabfdc7872f744
-
SHA512
1b4b48931f45071af8f3003dfa3278c6686e281560b1f7d1c822fe0676a3f40098ed68cb8be3b1a051fc18877e175e966a9e493f97bf2352e359e957ee7add25
-
SSDEEP
6144:XFc9ZgcSFf5bp/iHrHsoa7yNX/8G8zY5bKIspGfsIs:XFc9m93iHrjB/atIspRb
Malware Config
Signatures
Files
-
9c54390d2afa7f113d472904abb6ba27cde08bddeb2cdd52d5aabfdc7872f744.exe windows x86
8fd5bf20280a45b293ea8c255f1d284b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxW
RegisterClassExW
LoadIconW
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetMessageW
UpdateWindow
GetSystemMetrics
SetWindowRgn
GetClientRect
SetWindowLongW
GetWindowLongW
DefWindowProcW
GetDlgItem
SetTimer
ShowWindow
SetWindowPos
ScreenToClient
GetWindowRect
SendMessageW
CreateWindowExW
DestroyWindow
kernel32
LoadResource
IsProcessorFeaturePresent
LoadLibraryW
InterlockedDecrement
InterlockedIncrement
EncodePointer
DecodePointer
HeapSetInformation
GetCommandLineA
MoveFileA
HeapValidate
SignalObjectAndWait
DisconnectNamedPipe
GetVolumeNameForVolumeMountPointA
GetCurrentProcess
CreateThread
GetLastError
CreateEventA
SetEvent
CloseHandle
GetStartupInfoA
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
LCMapStringW
ExitProcess
HeapSize
GetFileType
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetTimeZoneInformation
WideCharToMultiByte
GetCurrentThreadId
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
RaiseException
FlushFileBuffers
HeapAlloc
HeapFree
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
DeleteCriticalSection
HeapCreate
SetEnvironmentVariableA
WaitForSingleObject
GetVersionExW
CreateEventW
TerminateThread
FindFirstFileW
FindClose
GetModuleHandleW
FindResourceW
LockResource
CreateFileW
SizeofResource
WriteFile
SetEndOfFile
FreeResource
GetModuleFileNameW
GetShortPathNameW
CopyFileW
SetFileAttributesW
DeleteFileW
LoadLibraryExW
GetProcAddress
FreeLibrary
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
CreateFileA
SetStdHandle
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetProcessHeap
ReadFile
LoadLibraryA
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
RemoveDirectoryW
FindNextFileW
SetLastError
GetExitCodeProcess
ResumeThread
CreateProcessW
Sleep
LocalFree
GetTickCount
CreateDirectoryW
GetTempPathW
GetFileAttributesW
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.code Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.BSS Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ