Static task
static1
Behavioral task
behavioral1
Sample
d9aae28f6bc432c800a6fff1c4832ca9f24f7a1f7d4d05fd5b9869e8975ff668.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9aae28f6bc432c800a6fff1c4832ca9f24f7a1f7d4d05fd5b9869e8975ff668.exe
Resource
win10v2004-20220901-en
General
-
Target
d9aae28f6bc432c800a6fff1c4832ca9f24f7a1f7d4d05fd5b9869e8975ff668
-
Size
123KB
-
MD5
83d30d0dce44d00a979e1fdac965be94
-
SHA1
719bcbfaa8a763edd4df50fe6ec622051b105764
-
SHA256
d9aae28f6bc432c800a6fff1c4832ca9f24f7a1f7d4d05fd5b9869e8975ff668
-
SHA512
ab01344083f6aca3d3829ab87da663046b9ebc46130220b6780115909ef9b5d46f827704d31d0d2dbb4b215b27c421b5acd9f873cc6aae3bae709b48437fba70
-
SSDEEP
1536:U1yhGzbIKygDC4fCye+cyR/A00JAiAH1Ws5Y+YOft3PTcTlLDJUGlNf1UFj:IyhCbIKyAtZJym9Y+h1rcTzUGjf1
Malware Config
Signatures
Files
-
d9aae28f6bc432c800a6fff1c4832ca9f24f7a1f7d4d05fd5b9869e8975ff668.exe windows x86
fca2a1fbd8cbf0585b9473fbebd6710e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetDiskFreeSpaceA
GetDriveTypeA
GetExitCodeProcess
GetFileTime
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetNamedPipeInfo
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetProcessShutdownParameters
GetShortPathNameA
GetStartupInfoA
GetSystemDirectoryA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetVersion
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
Heap32ListFirst
IsProcessorFeaturePresent
LoadLibraryA
LoadLibraryExA
LoadResource
FreeResource
LocalFileTimeToFileTime
LocalFree
LocalHandle
LockResource
MulDiv
ReadConsoleOutputAttribute
RemoveDirectoryA
ResetEvent
RtlUnwind
SetCurrentDirectoryA
SetEvent
SetFileApisToANSI
SetFilePointer
SetFileTime
SetProcessPriorityBoost
SetThreadPriority
SizeofResource
TerminateJobObject
TerminateThread
Toolhelp32ReadProcessMemory
VirtualAlloc
VirtualFree
VirtualProtectEx
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
_lclose
_llseek
_lopen
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
ExpandEnvironmentStringsA
ExitProcess
DeleteTimerQueueEx
DeleteFileA
CreateThread
CreateProcessA
CreateEventA
CreateDirectoryA
CloseHandle
LocalAlloc
AllocConsole
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
gdi32
GetDeviceCaps
user32
CallWindowProcA
CharNextA
CharPrevA
CharUpperA
DialogBoxIndirectParamA
DispatchMessageA
EnableWindow
EndDialog
ExitWindowsEx
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemTextA
GetWindowLongA
GetWindowRect
LoadStringA
MessageBeep
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetForegroundWindow
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
wsprintfA
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 490B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ