Static task
static1
Behavioral task
behavioral1
Sample
9ec0bd029e785c5020a0642139b43d0b57045322cd11d45e7cd4f0678eb9ad86.exe
Resource
win7-20221111-en
General
-
Target
9ec0bd029e785c5020a0642139b43d0b57045322cd11d45e7cd4f0678eb9ad86
-
Size
83KB
-
MD5
1262c254e562b447ad444e00eab56750
-
SHA1
d97320eee043d799592c0c7beebca09ef21aecfe
-
SHA256
9ec0bd029e785c5020a0642139b43d0b57045322cd11d45e7cd4f0678eb9ad86
-
SHA512
af59d31ffb433cdefcb9808d3d1c7915e363926c7cc8c40fed7291f6f665f0a17f1be75a78eb008d5efda96b7b87b4a6e36faa6b888d24c9816d482201d23d3f
-
SSDEEP
1536:ewu8lOGTQNVswrbapxfvDYCtdlJk7TBtfdOHt3iK54ju4x4N7vXst7QuQwa:E8jT8+wGLYCYTBJ4Ht3f5PS4N705NQ
Malware Config
Signatures
Files
-
9ec0bd029e785c5020a0642139b43d0b57045322cd11d45e7cd4f0678eb9ad86.exe windows x86
38b8acf1371ac42bd752364095e9aeae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetCurrentThreadId
SetSystemPowerState
GetLastError
GetCurrentProcessId
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
GetSystemTimeAsFileTime
user32
ExitWindowsEx
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
msvcr80
_exit
_XcptFilter
exit
__initenv
_initterm
_initterm_e
_configthreadlocale
_cexit
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
__getmainargs
_amsg_exit
_wcsicmp
??3@YAXPAX@Z
__setusermatherr
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE