Static task
static1
Behavioral task
behavioral1
Sample
9bbf2d069a5e978cf4dbced6ef32180dd20920bfb3147031dc9b4c416d0cebb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9bbf2d069a5e978cf4dbced6ef32180dd20920bfb3147031dc9b4c416d0cebb0.exe
Resource
win10v2004-20220812-en
General
-
Target
9bbf2d069a5e978cf4dbced6ef32180dd20920bfb3147031dc9b4c416d0cebb0
-
Size
802KB
-
MD5
08c538df04a699f1b2a07feb55967136
-
SHA1
4d1912b1bd53064ba64630dbbf9856669dffa1d0
-
SHA256
9bbf2d069a5e978cf4dbced6ef32180dd20920bfb3147031dc9b4c416d0cebb0
-
SHA512
633dcf0276c7f50e68ebc4739df6277551c2221588e1dc8574597a77b3e38bcfd3b8f4c74aac1465fdd6c1d1d2ff40d033363590e3ff1415960e9aa29c4901cb
-
SSDEEP
24576:TjlXWYMl/NwUtW3AFVL/JL6uNFbvf/mJ9:PtWYoFwUg36R51fs
Malware Config
Signatures
Files
-
9bbf2d069a5e978cf4dbced6ef32180dd20920bfb3147031dc9b4c416d0cebb0.exe windows x86
4525c2ef001e662b11559c8e21705992
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetFileAttributesA
CreateFileW
SetFilePointer
HeapDestroy
GetProcessHeap
DeleteFileW
OpenEventA
GlobalFlags
GetConsoleMode
GetVolumePathNameA
LeaveCriticalSection
CreateDirectoryA
OpenMutexA
FindAtomW
InterlockedExchange
GetCurrentThreadId
VirtualProtectEx
PulseEvent
DeleteFileW
SetFileTime
GetModuleFileNameA
GetDriveTypeW
CreateFileW
GetProcessVersion
user32
GetWindowLongA
GetWindowLongA
wsprintfA
DestroyIcon
MessageBoxA
PeekMessageA
DestroyMenu
LoadCursorA
IsMenu
SetFocus
GetWindowTextA
DispatchMessageA
SetRect
dot3msm
Dot3MsmFreeProfile
DllMain
Dot3MsmDeInit
Dot3MsmDisconnect
advapi32
IsValidAcl
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE