Static task
static1
Behavioral task
behavioral1
Sample
9362a5ac58869edffd62653a968e44776565937562d0aee764da685346a6e6ee.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9362a5ac58869edffd62653a968e44776565937562d0aee764da685346a6e6ee.exe
Resource
win10v2004-20221111-en
General
-
Target
9362a5ac58869edffd62653a968e44776565937562d0aee764da685346a6e6ee
-
Size
500KB
-
MD5
d457cecd20031ad13468fb99e1fae90f
-
SHA1
8e46ba6c243b9f2bc286137142742a06c8621154
-
SHA256
9362a5ac58869edffd62653a968e44776565937562d0aee764da685346a6e6ee
-
SHA512
f051050aa690ac74cd0dec00b5d482fcd4fe8a413bb2ec441280f1bb35b23d5c5365402bae4b91cc85d19bfd3f5d60e12d6a629b5d1aaf5b82694977d059e503
-
SSDEEP
12288:UPQVw6fnWdnX1ktVWcuAiVqUrxdOzjZ9OvGxFZi5L6Bgc5SPLEpM:UPQV3WlX1egl6jZ9OvGZiQyc5SPLEp
Malware Config
Signatures
Files
-
9362a5ac58869edffd62653a968e44776565937562d0aee764da685346a6e6ee.exe windows x86
9af200d3574ee6b9a7196f49cab7c4dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExA
AnimateWindow
RegisterWindowMessageA
OpenDesktopW
LoadStringA
GetClipboardSequenceNumber
CopyIcon
GetCursorInfo
RegisterClassA
CharLowerBuffW
RegisterClassExA
ShowWindow
MessageBoxA
CreateAcceleratorTableA
GetClassWord
DdeConnectList
SubtractRect
ScreenToClient
GetUpdateRgn
DdeFreeDataHandle
ChangeDisplaySettingsA
GetPropW
comctl32
InitCommonControlsEx
kernel32
VirtualQuery
GetVersion
GlobalUnfix
GetCurrentThread
GetStringTypeA
HeapSize
CompareStringA
CloseHandle
GetCommandLineW
GetTickCount
GetCPInfo
CreateMutexA
ExitProcess
GetModuleHandleA
GetSystemTimeAsFileTime
InterlockedIncrement
GetCurrentProcess
GetCurrentThreadId
GetModuleFileNameA
LeaveCriticalSection
InitializeCriticalSection
GetCompressedFileSizeA
GetEnvironmentStringsW
ReadFile
OpenMutexA
GetFileType
SetFilePointer
FreeEnvironmentStringsW
LoadLibraryA
TlsSetValue
GetSystemTime
TlsFree
FreeEnvironmentStringsA
SetStdHandle
GetLocalTime
HeapFree
GetStartupInfoW
HeapCreate
LCMapStringW
RtlUnwind
IsBadWritePtr
WriteFile
GetTimeZoneInformation
VirtualFree
GetStartupInfoA
HeapReAlloc
DeleteCriticalSection
CompareStringW
lstrcpy
GetCurrentProcessId
GetCommandLineA
SetHandleCount
QueryPerformanceCounter
TlsAlloc
GetStringTypeW
TlsGetValue
GetStdHandle
GetEnvironmentStrings
HeapAlloc
GetLastError
InterlockedDecrement
TerminateProcess
ExpandEnvironmentStringsW
WideCharToMultiByte
GetProcAddress
InterlockedExchange
MultiByteToWideChar
GetModuleFileNameW
HeapDestroy
EnterCriticalSection
VirtualAlloc
SetLastError
FlushFileBuffers
SetEnvironmentVariableA
LCMapStringA
UnhandledExceptionFilter
comdlg32
PageSetupDlgW
PageSetupDlgA
GetFileTitleW
FindTextW
gdi32
CloseEnhMetaFile
AbortPath
PlayEnhMetaFile
GetEnhMetaFileA
CreateDIBitmap
StartDocW
FixBrushOrgEx
SetViewportExtEx
shell32
RealShellExecuteA
SHGetInstanceExplorer
SHGetMalloc
SHFileOperationA
Sections
.text Size: 354KB - Virtual size: 354KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ