Static task
static1
Behavioral task
behavioral1
Sample
9eb949017013295bef0ad248ae7e7e6a1e0c337001da5a5651ee0ab6b7d5d3ba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9eb949017013295bef0ad248ae7e7e6a1e0c337001da5a5651ee0ab6b7d5d3ba.exe
Resource
win10v2004-20221111-en
General
-
Target
9eb949017013295bef0ad248ae7e7e6a1e0c337001da5a5651ee0ab6b7d5d3ba
-
Size
93KB
-
MD5
36fc56a7ce33916a09feb81b5fe52e33
-
SHA1
92bb52e6c2489f054c87684879ccf49e851d8b2a
-
SHA256
9eb949017013295bef0ad248ae7e7e6a1e0c337001da5a5651ee0ab6b7d5d3ba
-
SHA512
9333c97878accaf636dd0dbd4730365fed1132dbd3cfc234f5254b36b5eda17928709163fb76142ecec45db6f0fcf61ed895d00175c5e2056886a3c583ea2950
-
SSDEEP
1536:UADWm7KxPVuw7JU2epOu0KxAPDcOzU1KVUNv/e71PicueKwBx:U+OHK4cOzUkexeKe
Malware Config
Signatures
Files
-
9eb949017013295bef0ad248ae7e7e6a1e0c337001da5a5651ee0ab6b7d5d3ba.exe windows x86
2fe343d6e25f3d56e8d60a878517ff8c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleW
shell32
DragQueryFileW
DragAcceptFiles
ExtractIconW
SHGetFileInfoW
ShellExecuteW
DragFinish
ole32
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoInitializeEx
CoInitialize
advapi32
RegSetValueW
RegSetValueExW
RegCreateKeyW
RegCreateKeyExW
GetFileSecurityW
SetFileSecurityW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
gdi32
CombineRgn
SetRectRgn
CreateRectRgnIndirect
GetBkColor
StretchDIBits
CreateFontW
GetCharWidthW
PatBlt
CreatePatternBrush
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
SetViewportExtEx
SetTextColor
CreateFontIndirectW
GetStockObject
CreateSolidBrush
GetDeviceCaps
GetClipBox
GetObjectW
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
GetTextMetricsW
GetTextExtentPoint32W
SaveDC
RestoreDC
SetBkMode
SetMapMode
ExcludeClipRect
IntersectClipRect
DeleteObject
SelectClipRgn
SetBkColor
BitBlt
GetPixel
CreateRectRgn
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
ScaleViewportExtEx
shlwapi
PathStripToRootW
PathFindFileNameW
PathFindExtensionW
PathRemoveFileSpecW
PathIsUNCW
kernel32
GetEnvironmentStrings
InterlockedIncrement
InterlockedDecrement
FreeEnvironmentStringsA
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
GetProcessId
SetMailslotInfo
CreateIoCompletionPort
CreateTimerQueue
GetNamedPipeInfo
FindFirstFileExW
GetProcessIoCounters
IsWow64Process
LocalCompact
ResetWriteWatch
PulseEvent
PeekNamedPipe
GetMailslotInfo
GetThreadContext
GetCurrentProcessId
PostQueuedCompletionStatus
SetLastError
DisableThreadLibraryCalls
GetFileTime
SetProcessShutdownParameters
RequestWakeupLatency
GetTapeStatus
WTSGetActiveConsoleSessionId
GetProcessVersion
SetFilePointerEx
SetStdHandle
FreeResource
GetCommModemStatus
GetVersion
ResetEvent
EncodeSystemPointer
RemoveVectoredExceptionHandler
ReleaseSemaphore
ReleaseMutex
GetFileSize
FreeLibrary
GetACP
GetProcAddress
LoadLibraryA
CloseHandle
WriteFile
GetLastError
CreateFileW
SizeofResource
LockResource
LoadResource
FindResourceW
lstrcpyW
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryW
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
MulDiv
lstrlenW
LocalFree
FormatMessageW
GlobalFree
GetCurrentThreadId
GetVersionExA
lstrcmpW
CompareStringW
GetVersionExW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
GlobalGetAtomNameW
GetModuleHandleA
CompareStringA
GetLocaleInfoW
lstrcmpA
EnumResourceLanguagesW
ConvertDefaultLocale
GetCurrentThread
GetFileAttributesW
SetFileTime
GetTempFileNameW
GetFullPathNameW
GetDiskFreeSpaceW
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
lstrlenA
GetThreadLocale
FileTimeToSystemTime
SystemTimeToFileTime
WritePrivateProfileStringW
MoveFileW
DeleteFileW
GetStringTypeExW
lstrcmpiW
ReadFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileW
GetVolumeInformationW
GetShortPathNameW
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileSizeEx
SetErrorMode
GetStartupInfoW
RtlUnwind
RaiseException
SetEnvironmentVariableA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
VirtualAlloc
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
TerminateProcess
GetCPInfo
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
HeapSize
ExitProcess
Sleep
HeapReAlloc
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ