Static task
static1
Behavioral task
behavioral1
Sample
9402053eed320ded241667878c701a13371e16fd6cf9577eb71e85f2ca69a05f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9402053eed320ded241667878c701a13371e16fd6cf9577eb71e85f2ca69a05f.exe
Resource
win10v2004-20220812-en
General
-
Target
9402053eed320ded241667878c701a13371e16fd6cf9577eb71e85f2ca69a05f
-
Size
648KB
-
MD5
e668d585acf4c55b8ce55793ef62bd9b
-
SHA1
f67e89759003e4b07185a587544375931883825b
-
SHA256
9402053eed320ded241667878c701a13371e16fd6cf9577eb71e85f2ca69a05f
-
SHA512
517c8c32a1d6287455c3230985fc373d9ab6bbee61956d95c3da131be79df079c0ff50792f811ed3e57437198687304bc0714ebcf2359f525b37240710f4376c
-
SSDEEP
12288:AaSQWQywutTe4EVO14T/ZaP0HElk+PlG4sLU2iQYxUC+vqcqQnoSQ+3GN:AaSnQJI5EVmiZaP7f0LbXrC+vEQoSQ+
Malware Config
Signatures
Files
-
9402053eed320ded241667878c701a13371e16fd6cf9577eb71e85f2ca69a05f.exe windows x86
e876d5753abd7fc74aa6dffa947808fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
InitMUILanguage
_TrackMouseEvent
ImageList_LoadImageA
GetEffectiveClientRect
ImageList_Draw
user32
AnyPopup
RemoveMenu
BringWindowToTop
GetMenuState
DdeQueryNextServer
DestroyWindow
DlgDirSelectComboBoxExA
WindowFromPoint
CharUpperBuffW
RegisterClassExA
SystemParametersInfoW
MessageBoxA
GetDialogBaseUnits
DefWindowProcA
OpenClipboard
MessageBoxExA
GetKeyNameTextA
EndPaint
DrawAnimatedRects
GetUserObjectInformationA
SetMessageExtraInfo
CreateWindowExA
ShowWindow
RegisterClassA
kernel32
FreeEnvironmentStringsA
GetStartupInfoA
QueryPerformanceCounter
CompareStringW
GetSystemTime
InterlockedExchange
GetModuleHandleA
GetTempFileNameA
HeapReAlloc
UnhandledExceptionFilter
FlushFileBuffers
GetLastError
GetNamedPipeHandleStateA
HeapDestroy
GetStringTypeExA
VirtualFree
IsBadWritePtr
GetACP
MultiByteToWideChar
LCMapStringA
GetCurrentThread
DeleteCriticalSection
GetEnvironmentStrings
TlsAlloc
SetEnvironmentVariableA
VirtualAlloc
WideCharToMultiByte
ExitProcess
InterlockedDecrement
GetEnvironmentStringsW
LCMapStringW
CloseHandle
CompareStringA
ReadFile
SetFilePointer
GetLocalTime
LoadLibraryA
VirtualQuery
TerminateProcess
InitializeCriticalSection
LeaveCriticalSection
GetCurrentProcessId
HeapCreate
GetTimeZoneInformation
RtlUnwind
GetSystemTimeAsFileTime
EnterCriticalSection
SetStdHandle
GetProcAddress
HeapAlloc
GetOEMCP
TlsGetValue
GetCPInfo
GetTempFileNameW
GetCurrentThreadId
OpenMutexA
GetModuleFileNameA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetTickCount
GetCommandLineA
TlsSetValue
CreateProcessA
GetFileType
FreeEnvironmentStringsW
HeapFree
CreateMutexA
GetCurrentProcess
InterlockedIncrement
SetLastError
GetProcAddress
GetVersion
TlsFree
SetHandleCount
WriteFile
Sections
.text Size: 244KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ