Static task
static1
Behavioral task
behavioral1
Sample
f9e8fa4c224e8c041d3e13e78513aba2caf84e82bb32e3611233637a60a28bdd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f9e8fa4c224e8c041d3e13e78513aba2caf84e82bb32e3611233637a60a28bdd.exe
Resource
win10v2004-20220812-en
General
-
Target
f9e8fa4c224e8c041d3e13e78513aba2caf84e82bb32e3611233637a60a28bdd
-
Size
710KB
-
MD5
09ffe77e676087c1b8af7d14b8013082
-
SHA1
a4c04f3d99e9424a75d145fecdcefceef09eb0dd
-
SHA256
f9e8fa4c224e8c041d3e13e78513aba2caf84e82bb32e3611233637a60a28bdd
-
SHA512
4b6680ff2afdec46aa9470b14f4de271befe6f8ef392fade2c3352f02330a7df6f4d39b1b9aa015d56812448586e3884bbb89cd1e3f00277db2625246517b32e
-
SSDEEP
12288:sfKcPm/4SCrAZ4Qz0uQSf23mlYzeH3LiteeN67uJTHLdEStAvzTaMJyDh0xhA:sfKcNrAZhzXvH7iteeU7YrdrtgzTaMJM
Malware Config
Signatures
Files
-
f9e8fa4c224e8c041d3e13e78513aba2caf84e82bb32e3611233637a60a28bdd.exe windows x86
bccbdcfd22276acf22fe308f7326d80f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
IsBadCodePtr
GetComputerNameExW
GetAtomNameW
GlobalAddAtomA
CreateSemaphoreW
ConnectNamedPipe
FindClose
SetVolumeLabelA
CreateTimerQueueTimer
_lread
MoveFileExA
GetThreadTimes
FindNextVolumeMountPointW
DuplicateHandle
MapViewOfFile
GetDiskFreeSpaceW
SetFilePointer
lstrcmpW
UnhandledExceptionFilter
FreeUserPhysicalPages
GetShortPathNameW
SetWaitableTimer
GetFileSizeEx
GetPrivateProfileSectionNamesW
DeleteTimerQueue
FreeEnvironmentStringsW
CreateFileMappingW
SuspendThread
SetSystemTime
CancelWaitableTimer
EscapeCommFunction
EnumUILanguagesA
SetEnvironmentVariableA
WideCharToMultiByte
ChangeTimerQueueTimer
GetCalendarInfoW
LCMapStringA
FindAtomW
GetCurrentThreadId
GetCommMask
_lclose
SetFileAttributesA
FindFirstFileA
GetSystemTimeAdjustment
FindResourceExA
_lwrite
DefineDosDeviceA
BackupSeek
lstrcpynW
SetTapeParameters
IsValidCodePage
GetStringTypeExA
LocalFlags
SetFileAttributesW
IsBadWritePtr
GlobalFree
EnumResourceLanguagesA
GetSystemTime
RemoveDirectoryW
IsValidLanguageGroup
GetVolumeInformationA
EnumResourceNamesW
SetDefaultCommConfigW
IsValidLocale
FindNextVolumeA
lstrcpyW
lstrcpynA
InterlockedIncrement
MoveFileExW
WritePrivateProfileStructA
SetCurrentDirectoryW
GetSystemWindowsDirectoryW
GetFileAttributesW
CreateEventW
GetSystemPowerStatus
IsBadStringPtrA
WritePrivateProfileStringA
SetSystemPowerState
EnumTimeFormatsW
CreateWaitableTimerA
GetCommModemStatus
GetPrivateProfileSectionW
GetCPInfoExW
SetMailslotInfo
GetShortPathNameA
ConvertDefaultLocale
GetPrivateProfileIntW
GetPrivateProfileStringW
GetExitCodeThread
GetWindowsDirectoryW
GetNamedPipeHandleStateW
FatalAppExitA
SetLocaleInfoA
LocalAlloc
GetProcessPriorityBoost
WritePrivateProfileStructW
UpdateResourceA
GetDateFormatW
GlobalGetAtomNameW
QueryPerformanceCounter
UnmapViewOfFile
InterlockedDecrement
GetProfileIntW
GetCPInfo
GetFileTime
GetFileAttributesA
GetDevicePowerState
GetCalendarInfoA
EndUpdateResourceW
GetAtomNameA
shlwapi
PathAppendA
user32
DialogBoxIndirectParamW
DrawAnimatedRects
SetMenuItemInfoA
SetDlgItemTextW
MessageBoxExA
SetActiveWindow
UpdateWindow
CharLowerBuffA
SendMessageCallbackW
RegisterDeviceNotificationW
EnumChildWindows
GetWindowLongA
SetParent
FillRect
MapDialogRect
DlgDirListW
SetThreadDesktop
TrackMouseEvent
GetDesktopWindow
SetWindowContextHelpId
DestroyWindow
GetMenuBarInfo
GetDialogBaseUnits
SetDebugErrorLevel
LoadMenuA
DdeClientTransaction
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 273KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ