Static task
static1
Behavioral task
behavioral1
Sample
9177c216038a6110858df57a838b63762c32dca164a4910c696efb6ccebc12cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9177c216038a6110858df57a838b63762c32dca164a4910c696efb6ccebc12cf.exe
Resource
win10v2004-20220901-en
General
-
Target
9177c216038a6110858df57a838b63762c32dca164a4910c696efb6ccebc12cf
-
Size
144KB
-
MD5
a37d4c22b8facfdd37dcf6a8b336f3c0
-
SHA1
c7f1090236c333bcfe4b2057f01c49f38106860e
-
SHA256
9177c216038a6110858df57a838b63762c32dca164a4910c696efb6ccebc12cf
-
SHA512
d04fe8190611d55d9119c243c7c182644871b418d7092541f34830f0a2a704bfd6694d027face2d20e97f1e4ea6d44f35b880f5c65903ea15bf07d867488421e
-
SSDEEP
3072:AGMohJ718OEiNBP718rBrBQyizKgtFJlsmih:LhJ58OdV7CFiyiWC6mih
Malware Config
Signatures
Files
-
9177c216038a6110858df57a838b63762c32dca164a4910c696efb6ccebc12cf.exe windows x86
adf801abd4677429ccec4447083cae59
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
GetLastError
GetModuleHandleA
GetProcAddress
CloseHandle
GetTempPathA
GetTickCount
RtlUnwind
SetLastError
GetCommandLineA
GetStdHandle
MultiByteToWideChar
GetFileType
LoadLibraryA
FreeLibrary
LocalFree
FindFirstFileA
LocalAlloc
WriteConsoleA
FormatMessageA
FindNextFileA
GetFileAttributesA
VerifyVersionInfoW
crtdll
__GetMainArgs
exit
raise
signal
ntdll
VerSetConditionMask
wcsncpy
wcschr
wcslen
memmove
_wcslwr
wcscmp
wcscpy
_wcsnicmp
wcscat
_ultoa
wcstoul
wcstol
user32
LoadStringA
winsta
WinStationOpenServerW
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 129KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 434B - Virtual size: 434B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ