Static task
static1
Behavioral task
behavioral1
Sample
c9f3f555e9fa12a291ffa26df63ff5a262c3f6a77910bd91f1bb72c28ebd6640.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c9f3f555e9fa12a291ffa26df63ff5a262c3f6a77910bd91f1bb72c28ebd6640.exe
Resource
win10v2004-20221111-en
General
-
Target
c9f3f555e9fa12a291ffa26df63ff5a262c3f6a77910bd91f1bb72c28ebd6640
-
Size
1.2MB
-
MD5
6db0442a5886d726e48071c2592a3b94
-
SHA1
7ed9835ce8505d18bfb98737bab34295b06288cb
-
SHA256
c9f3f555e9fa12a291ffa26df63ff5a262c3f6a77910bd91f1bb72c28ebd6640
-
SHA512
62e322c2dc9ebd451caf700ef11efc82cb806fbbd8a4a03bc7ec24211ab827ce04270edc7ce2c345085712b06ecc9e8d05feb39dda0265b56f149495cdb9362a
-
SSDEEP
12288:yWXdAO18j4rfB0Tm7fm3Uxw0eWKnWzY8bZAS9zhaK+V4jrgG943X4TPpEri5c8th:RXPhrbWS90SjH9sU3SbCfVU4SILKFjls
Malware Config
Signatures
Files
-
c9f3f555e9fa12a291ffa26df63ff5a262c3f6a77910bd91f1bb72c28ebd6640.exe windows x86
b90eea811d21ff2e6884ff0e58cc2183
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
IsBadWritePtr
lstrlenW
FatalAppExitA
DebugBreak
lstrcpyW
FindResourceA
FreeResource
LoadResource
GetCurrentProcess
SizeofResource
GetConsoleWindow
LockResource
CloseHandle
CreateFileA
ReadFile
VirtualFree
FreeLibrary
WaitForSingleObject
CreateRemoteThread
OpenProcess
VirtualFreeEx
ReadProcessMemory
GetProcAddress
VirtualAlloc
VirtualAllocEx
LoadLibraryA
GetSystemInfo
GetCurrentThreadId
WriteProcessMemory
GetFileSize
SetFilePointer
WriteFile
Sleep
SystemTimeToTzSpecificLocalTime
GetTickCount
GetTimeZoneInformation
GetCurrentThread
InitializeCriticalSection
TerminateThread
LeaveCriticalSection
EnterCriticalSection
OpenThread
GetExitCodeThread
DeleteCriticalSection
SuspendThread
ResumeThread
AllocConsole
ReadConsoleA
FlushConsoleInputBuffer
SetConsoleMode
SetConsoleTitleA
GetStdHandle
SetConsoleCtrlHandler
SetConsoleWindowInfo
GetCurrentProcessId
HeapAlloc
HeapFree
GetProcessHeap
InterlockedIncrement
VirtualProtect
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
GetFullPathNameA
HeapReAlloc
ExitThread
CreateThread
RtlUnwind
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
DuplicateHandle
MoveFileA
CreateProcessA
DeleteFileA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
LCMapStringW
LoadLibraryW
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapCreate
QueryPerformanceCounter
RaiseException
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetDriveTypeW
CompareStringW
IsProcessorFeaturePresent
CreatePipe
GetExitCodeProcess
HeapSize
WriteConsoleW
GetCurrentDirectoryW
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
GetFileAttributesA
LocalFree
GetLastError
MultiByteToWideChar
WideCharToMultiByte
FormatMessageA
GetModuleFileNameA
GetModuleHandleA
IsBadReadPtr
SetErrorMode
user32
WinHelpA
IsWindowVisible
IsWindow
RegisterClassA
CallWindowProcA
MapWindowPoints
EqualRect
GetActiveWindow
ShowWindow
LoadIconA
SetWindowPos
CreateWindowExA
DefWindowProcA
GetSystemMenu
SetActiveWindow
IsIconic
ModifyMenuA
GetWindowThreadProcessId
GetMessageA
TranslateMessage
PeekMessageA
DispatchMessageA
SetForegroundWindow
SetWindowRgn
GetWindowRect
wsprintfA
SetFocus
OffsetRect
IntersectRect
MessageBoxA
GetWindowLongA
GetClientRect
ole32
OleRegGetUserType
CreateOleAdviseHolder
CoTaskMemAlloc
OleCreate
OleSetContainedObject
StringFromIID
CLSIDFromString
CLSIDFromProgID
CoRegisterClassObject
CoRevokeClassObject
MkParseDisplayName
CreateBindCtx
CoCreateInstance
CoLockObjectExternal
StringFromCLSID
OleInitialize
OleUninitialize
CoTaskMemFree
shlwapi
StrFormatByteSize64A
SHDeleteKeyA
gdi32
SetWindowOrgEx
SetWindowExtEx
DeleteObject
CreateRectRgnIndirect
SetViewportExtEx
SetViewportOrgEx
SetMapMode
advapi32
RegEnumKeyExA
RegQueryValueExA
IsTextUnicode
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
oleaut32
GetActiveObject
VariantInit
VariantCopyInd
VariantClear
LoadTypeLibEx
SysFreeString
SysStringLen
SysAllocStringLen
LoadRegTypeLi
LHashValOfNameSys
SafeArrayCreateVector
VariantTimeToSystemTime
SafeArrayAccessData
VariantCopy
SafeArrayDestroy
SafeArrayCreate
SystemTimeToVariantTime
SafeArrayGetDim
VariantChangeType
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayPutElement
DispGetIDsOfNames
UnRegisterTypeLi
Sections
.text Size: 490KB - Virtual size: 489KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 581KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ