Static task
static1
Behavioral task
behavioral1
Sample
09cdf2df36f0a6346f518aeeb0ae0db3a19ffee684b94d437d48d6f5843eeae7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
09cdf2df36f0a6346f518aeeb0ae0db3a19ffee684b94d437d48d6f5843eeae7.exe
Resource
win10v2004-20220901-en
General
-
Target
09cdf2df36f0a6346f518aeeb0ae0db3a19ffee684b94d437d48d6f5843eeae7
-
Size
124KB
-
MD5
4477871ac0c745c677415ab6065f3be0
-
SHA1
1ad340a12fb1a6813a23b2455a8e221eed60b0fc
-
SHA256
09cdf2df36f0a6346f518aeeb0ae0db3a19ffee684b94d437d48d6f5843eeae7
-
SHA512
2700ca962acaeec0b7d2dae9566af16a03f4a0999ceea25f69dacc4a3182d8d5b830696fd21b2f2f878d9d589b5fc85f7e1fe546064c97d11841d2312e2a9fd1
-
SSDEEP
3072:ErO5tBoutYU+Fsxkz2lwR43t0oGJmeN8:WOJHP+K+z2lw23t0dme
Malware Config
Signatures
Files
-
09cdf2df36f0a6346f518aeeb0ae0db3a19ffee684b94d437d48d6f5843eeae7.exe windows x86
31afeda72aa98dde4c17ce8acf6cc71a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SetLocalTime
DeleteFileA
GetCommandLineA
GlobalSize
GetStdHandle
HeapSize
VirtualProtect
ResumeThread
WriteFile
ResumeThread
CreateDirectoryA
ReadConsoleW
GetProcessHeap
GetFileAttributesA
GetLocaleInfoA
GetModuleHandleA
GetPriorityClass
CreatePipe
SuspendThread
GetDriveTypeA
IsBadReadPtr
user32
GetWindowLongW
wsprintfA
GetCaretPos
DispatchMessageA
PeekMessageA
GetWindowTextW
SetFocus
SetCursor
LoadCursorA
GetMessageA
DestroyMenu
GetCapture
DrawIcon
els
DllGetClassObject
DllGetClassObject
DllRegisterServer
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE