Static task
static1
Behavioral task
behavioral1
Sample
9052224281f0841b0a2dc3c632d80dfc3dcc360cd2cab14858270b59a61943e7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9052224281f0841b0a2dc3c632d80dfc3dcc360cd2cab14858270b59a61943e7.exe
Resource
win10v2004-20220812-en
General
-
Target
9052224281f0841b0a2dc3c632d80dfc3dcc360cd2cab14858270b59a61943e7
-
Size
4.2MB
-
MD5
cb3fe73c8b7a46e2cc3a32b66c3a4dcd
-
SHA1
f4592c09d2168d3d1f20f84b192dcdc715fc8c18
-
SHA256
9052224281f0841b0a2dc3c632d80dfc3dcc360cd2cab14858270b59a61943e7
-
SHA512
c082552087fc58f0ffb832913e98dcef48165eef516f9e79459aaf2d55ff763ca3191e1056b66fd8e5ec5f81cdd9b61250c0c01862c521371451c1b82a46ee9e
-
SSDEEP
98304:ivv3jh4d44WDZK0GELFn5EnBmbGp4Qf+pnzG:ivv/FDBWB/+QmxG
Malware Config
Signatures
Files
-
9052224281f0841b0a2dc3c632d80dfc3dcc360cd2cab14858270b59a61943e7.exe windows x86
a8de070a8d658b48be82c5d7d62c54b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
ExitThread
WideCharToMultiByte
MultiByteToWideChar
WaitForSingleObjectEx
FileTimeToLocalFileTime
GetCurrentThread
HeapFree
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
CreateFileW
CreateMutexA
GetModuleHandleExW
Sleep
GetLastError
GetTickCount
InterlockedCompareExchange
GetModuleHandleA
GetVersionExA
ReadFile
ResumeThread
VirtualAlloc
VirtualFree
HeapReAlloc
DisableThreadLibraryCalls
GetFileAttributesA
CloseHandle
GetTempPathA
GetProcAddress
LoadLibraryA
RemoveDirectoryA
WaitForSingleObject
SetLastError
LocalFileTimeToFileTime
IsBadReadPtr
HeapAlloc
ExitProcess
WriteConsoleW
GetConsoleCP
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
LCMapStringW
LoadLibraryExW
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
SetEndOfFile
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetStringTypeW
GetStartupInfoW
DeleteCriticalSection
GetFileType
SetFilePointerEx
SetFilePointer
ReadConsoleW
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineA
InterlockedDecrement
AreFileApisANSI
HeapSize
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
GetConsoleMode
advapi32
RegEnumKeyA
RegCreateKeyExA
RegCreateKeyW
RegOpenKeyW
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegOpenKeyA
RegCloseKey
RegQueryValueW
RegQueryInfoKeyW
user32
RedrawWindow
LoadIconW
DispatchMessageA
GetWindowTextW
RegisterClassExA
CreateWindowExA
FindWindowW
GetWindowTextA
SetWindowPos
RegisterWindowMessageW
PeekMessageA
RegisterWindowMessageA
MsgWaitForMultipleObjects
GetMessageW
SendMessageA
PostQuitMessage
SendMessageW
UpdateWindow
MessageBoxW
GetClientRect
PostMessageA
GetWindowRect
CreatePopupMenu
SetFocus
GetLastInputInfo
LoadIconA
SetForegroundWindow
CloseDesktop
EnumWindows
DefWindowProcA
GetCursorPos
TranslateMessage
GetParent
BringWindowToTop
TrackPopupMenu
RegisterClassExW
PeekMessageW
AppendMenuW
DestroyWindow
Sections
.text Size: 552KB - Virtual size: 552KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ