Static task
static1
Behavioral task
behavioral1
Sample
c9d0768be477159c4e64217b11283139cab0d86b1712861e9b7f0573f82999e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c9d0768be477159c4e64217b11283139cab0d86b1712861e9b7f0573f82999e9.exe
Resource
win10v2004-20220901-en
General
-
Target
c9d0768be477159c4e64217b11283139cab0d86b1712861e9b7f0573f82999e9
-
Size
25KB
-
MD5
229043c36c386bb584dc0db511ff88d0
-
SHA1
7fe52ca4ccb6e6fe33cc65949ee60a61330d02f1
-
SHA256
c9d0768be477159c4e64217b11283139cab0d86b1712861e9b7f0573f82999e9
-
SHA512
dc0da5234e7fa9caa7ff8ae0d6eba90784f1e25d58612353490bda3f3d02a050f5234b309b99b833948b375e6d045b38f41af47d6f19ccc696e9059354844330
-
SSDEEP
384:oxN7ARVWDR/H/ALU1n1BVMQTbo2PMjlcGCnn+zJMIVOCVOlToqaTLcVI3:oxaRVWR/H/NnTM0o2PM7aw/1+Bat
Malware Config
Signatures
Files
-
c9d0768be477159c4e64217b11283139cab0d86b1712861e9b7f0573f82999e9.exe windows x86
ce082cfe448b9ce98dc5aa0432aa5c7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LoadResource
EndUpdateResourceA
LocalReAlloc
GetProcAddress
GetPrivateProfileIntA
GetCurrentProcess
IsBadHugeReadPtr
GetPrivateProfileSectionA
GetUserDefaultUILanguage
GetLargestConsoleWindowSize
IsBadReadPtr
MulDiv
WaitForSingleObject
LocalUnlock
GetFileType
WaitNamedPipeA
CreateIoCompletionPort
BeginUpdateResourceA
VirtualAlloc
DuplicateHandle
GetWindowsDirectoryA
VirtualQuery
DosDateTimeToFileTime
FoldStringA
DeviceIoControl
ConnectNamedPipe
GetHandleInformation
QueryDosDeviceA
GetLocalTime
CopyFileExA
GetLastError
Sleep
WriteProfileStringA
GetNamedPipeInfo
GetStdHandle
WritePrivateProfileStringA
AllocConsole
VirtualFreeEx
WritePrivateProfileSectionA
SetFileAttributesA
GetEnvironmentStrings
PurgeComm
GetConsoleCP
DeleteFileA
LockFile
GetOEMCP
DeleteAtom
GetShortPathNameA
GlobalAlloc
GetNamedPipeHandleStateA
WaitForMultipleObjectsEx
OpenEventA
GetProcessHeaps
GetLogicalDrives
CreateDirectoryA
GlobalUnWire
MoveFileExA
GetThreadPriority
GetCommConfig
GetExitCodeProcess
SetEvent
CancelIo
ReadConsoleA
GlobalLock
GetThreadSelectorEntry
GetTickCount
PeekConsoleInputA
GetProfileIntA
DisconnectNamedPipe
GetSystemDefaultUILanguage
IsDebuggerPresent
HeapReAlloc
ReadProcessMemory
EraseTape
CommConfigDialogA
CopyFileA
GetSystemDirectoryA
IsBadHugeWritePtr
GetVolumeInformationA
PostQueuedCompletionStatus
CreateDirectoryExA
IsBadWritePtr
SearchPathA
CreateFileA
GetProcessHeap
HeapAlloc
GetProfileSectionA
MoveFileA
GetFileAttributesA
ReleaseSemaphore
LocalFlags
GetThreadLocale
FreeLibrary
GetProfileStringA
UnlockFile
GlobalWire
CreateFiber
GetCPInfo
PeekNamedPipe
Beep
WriteProfileSectionA
SetErrorMode
FreeConsole
GlobalHandle
FreeResource
GetDiskFreeSpaceA
OpenFileMappingA
FindAtomA
GetCommMask
IsBadCodePtr
SetFileTime
PulseEvent
GetFileInformationByHandle
GetCurrentThread
LocalCompact
GetPrivateProfileStructA
GetProcessAffinityMask
FlushViewOfFile
WaitForMultipleObjects
HeapValidate
AddAtomA
VirtualQueryEx
VirtualUnlock
GetConsoleCursorInfo
FindResourceExA
GetSystemDefaultLCID
LocalShrink
WriteFile
GetConsoleOutputCP
SetFilePointer
DeleteFiber
IsBadStringPtrA
GlobalFix
GetLongPathNameA
SizeofResource
LocalHandle
FlushConsoleInputBuffer
GetModuleHandleA
FindNextChangeNotification
GetThreadTimes
FormatMessageA
GetCommandLineA
GlobalReAlloc
ReadFile
GetFullPathNameA
ReleaseMutex
MapViewOfFile
CreateConsoleScreenBuffer
FindCloseChangeNotification
RemoveDirectoryA
GetTempPathA
VirtualProtect
GetCurrentProcessId
QueryPerformanceCounter
GetLogicalDriveStringsA
GetStartupInfoA
msvcrt
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE