Static task
static1
Behavioral task
behavioral1
Sample
9de0ae4b2fb7ac430984f296cc2e5328dc0ab5588797d3a96e0b1255e00075ec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9de0ae4b2fb7ac430984f296cc2e5328dc0ab5588797d3a96e0b1255e00075ec.exe
Resource
win10v2004-20220901-en
General
-
Target
9de0ae4b2fb7ac430984f296cc2e5328dc0ab5588797d3a96e0b1255e00075ec
-
Size
270KB
-
MD5
ca3e90b4199a983e558e4be4811f50a6
-
SHA1
f3b60bdfff1b2994240f6ab09b691681d3094dac
-
SHA256
9de0ae4b2fb7ac430984f296cc2e5328dc0ab5588797d3a96e0b1255e00075ec
-
SHA512
107474ae10fe412158af39d5de92b80b6967d2fc3ada90dafed3feb9c663e0fe35d69e9a9b685d5da5fa182aeee3782020645631e14eefcd8f639c2af8803ca0
-
SSDEEP
6144:79C5qXAF5EAQYFFHj8A/+z3dtzLNVXHTzvmyWnCFM:x2qwDEi9+v7z9FM
Malware Config
Signatures
Files
-
9de0ae4b2fb7ac430984f296cc2e5328dc0ab5588797d3a96e0b1255e00075ec.exe windows x86
1b4d28916fb2d1250ce8b3f602bd1760
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
hwdll
ord75
ord40
ord49
ord27
ord8
ord1
ord111
ord166
ord78
ord9
ord23
ord140
ord28
ord216
ord106
ord3
ord26
ord125
ord172
ord38
ord46
ord146
ord120
ord63
ord76
ord107
ord121
ord71
ord124
ord174
ord66
ord69
ord72
ord14
ord119
ord113
ord110
ord12
ord276
ord35
ord141
ord264
ord48
ord50
ord41
ord59
ord196
ord42
ord62
ord60
ord22
ord2
ord173
ord4
ord263
ord144
ord139
ord143
ord31
ord33
ord30
ord122
ord126
ord123
ord259
ord258
ord137
ord127
ord108
ord109
ord115
ord114
ord51
ord53
ord257
ord32
ord56
ord39
ord43
ord132
ord130
ord131
ord133
ord134
ord136
ord135
ord57
ord148
ord85
ord82
ord246
ord147
ord155
ord29
ord128
ord157
ord202
ord207
ord205
ord162
ord206
ord203
ord5
ord176
ord10
ord77
ord25
ord67
ord64
ord65
ord154
ord80
ord61
ord195
ord54
ord175
kernel32
GlobalSize
GetTempPathA
GetProcAddress
LoadLibraryA
_lwrite
MulDiv
_lcreat
_lread
_llseek
SetEndOfFile
SetFilePointer
GetLastError
TlsSetValue
CompareStringA
lstrcatA
SearchPathA
GetWindowsDirectoryA
OpenFile
IsDBCSLeadByte
EnumSystemLocalesA
FindClose
FindNextFileA
FindFirstFileA
SetCurrentDirectoryA
MapViewOfFile
CreateFileMappingA
LocalAlloc
ReleaseSemaphore
CreateThread
CreateSemaphoreA
Sleep
WaitForSingleObject
ExitThread
GetTempFileNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
RtlUnwind
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
HeapFree
GetCurrentThreadId
CloseHandle
TlsAlloc
SetLastError
TlsGetValue
HeapAlloc
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetFileType
GetStdHandle
HeapCreate
WriteFile
LCMapStringW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetLocaleInfoW
ReadFile
HeapReAlloc
HeapSize
SetStdHandle
FlushFileBuffers
CompareStringW
SetEnvironmentVariableA
lstrcpyA
GetTickCount
WinExec
GetFileAttributesA
_lopen
GetFileSize
GetFullPathNameA
DeleteFileA
GetCurrentDirectoryA
FreeLibrary
_lclose
GetUserDefaultLangID
LCMapStringA
user32
GetWindowRect
EnumClipboardFormats
OpenClipboard
CharUpperA
ReleaseDC
GetDC
IsCharAlphaNumericA
WinHelpA
CharNextA
DrawTextA
SetRect
LoadBitmapA
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
ShowWindow
CreateWindowExA
GetSystemMetrics
GetClipboardFormatNameA
GetDesktopWindow
RegisterClassA
LoadIconA
PeekMessageA
KillTimer
DefWindowProcA
GetClipboardData
CloseClipboard
MessageBoxA
FindWindowA
SetForegroundWindow
PostMessageA
SetFocus
IsWindow
CharLowerA
SetWindowTextA
wsprintfA
SendMessageA
IsWindowVisible
gdi32
GetTextMetricsA
GetDIBits
GetTextExtentPointA
BitBlt
GdiFlush
CreateCompatibleDC
GetStockObject
DeleteDC
DeleteObject
SelectObject
SetTextColor
SetBkMode
Sections
.text Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ