Static task
static1
Behavioral task
behavioral1
Sample
99912e87eb2a558447af16ccac18b8cca2de71cc6dd7650b0e2f6fd6c2b13520.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
99912e87eb2a558447af16ccac18b8cca2de71cc6dd7650b0e2f6fd6c2b13520.exe
Resource
win10v2004-20221111-en
General
-
Target
99912e87eb2a558447af16ccac18b8cca2de71cc6dd7650b0e2f6fd6c2b13520
-
Size
366KB
-
MD5
8c1ea4016bfef6d21d7f2f63d59fd37e
-
SHA1
0c74547c63a768025cbe474e0e15e44850ba193f
-
SHA256
99912e87eb2a558447af16ccac18b8cca2de71cc6dd7650b0e2f6fd6c2b13520
-
SHA512
94ac08ae5f623bef066512dc72ce084de794e6527c9a7f9084d2b768a17ea6062d1575e8d9ae7264d17687c6503c09b466dd85a858aea5571ec066a03d2340b6
-
SSDEEP
6144:PUmSHGQ+rJtw8vbcN2YG+bQvSxfZ6lGLHDV0nO:jSHGQYJ+MgNzNQA6lGDh0
Malware Config
Signatures
Files
-
99912e87eb2a558447af16ccac18b8cca2de71cc6dd7650b0e2f6fd6c2b13520.exe windows x86
d206ba53c14b896e6d717f61828a67b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
SetLastError
GetAtomNameW
WriteConsoleW
GetCurrentProcess
OpenMutexA
InterlockedExchange
CreateDirectoryW
EnterCriticalSection
GetCPInfo
HeapDestroy
LoadLibraryA
GetFileAttributesExA
HeapFree
SetHandleCount
WideCharToMultiByte
GetCurrentThread
VirtualQuery
GetEnvironmentStrings
SetEnvironmentVariableA
LCMapStringW
FlushFileBuffers
HeapReAlloc
ExitProcess
RtlUnwind
TerminateProcess
FreeLibrary
TlsAlloc
GetCurrencyFormatA
GetConsoleCP
HeapAlloc
GetTickCount
IsValidLocale
TlsGetValue
lstrcpyn
RemoveDirectoryW
EnumSystemLocalesA
InterlockedIncrement
CreateFileA
CreateMutexA
OutputDebugStringW
HeapSize
GetModuleFileNameA
GetCurrentThreadId
GetStringTypeW
Sleep
SetConsoleCtrlHandler
GetVersionExA
GetLocaleInfoW
MultiByteToWideChar
IsDebuggerPresent
GetLastError
InitializeCriticalSection
GetStartupInfoW
FreeEnvironmentStringsW
SetStdHandle
InterlockedDecrement
UnhandledExceptionFilter
GetStdHandle
GetShortPathNameA
GetLocaleInfoA
CompareStringW
GetProcessHeap
ReadFile
ReadConsoleOutputW
QueryPerformanceCounter
WritePrivateProfileStringW
SetFilePointer
GetStringTypeA
TlsFree
GetConsoleOutputCP
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
CompareStringA
GetOEMCP
GetFileType
GetCurrentProcessId
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
CreateMutexW
GetCommandLineW
GetStartupInfoA
TlsSetValue
DeleteCriticalSection
LeaveCriticalSection
GetCommandLineA
WriteConsoleA
GetUserDefaultLCID
GetModuleHandleA
GetEnvironmentStringsW
SetCurrentDirectoryW
VirtualFree
GetACP
GetTimeFormatA
LCMapStringA
HeapCreate
LocalLock
GetConsoleMode
GetModuleFileNameW
GetProcAddress
VirtualAlloc
IsValidCodePage
shell32
ExtractAssociatedIconA
SHGetDataFromIDListW
ExtractIconA
ExtractIconExA
comctl32
ImageList_SetImageCount
ImageList_GetImageRect
DrawStatusTextW
InitCommonControlsEx
ImageList_Read
user32
ExcludeUpdateRgn
CopyIcon
GetNextDlgTabItem
CreatePopupMenu
RegisterClassExA
RegisterClassA
GetIconInfo
ShowWindow
SendDlgItemMessageA
MessageBoxA
GetMenu
LoadAcceleratorsA
TileChildWindows
ToUnicode
GetScrollPos
CreateWindowExA
GetWindowDC
SwapMouseButton
UnregisterHotKey
SetCursor
GetMenuStringW
CharNextExA
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ