Static task
static1
Behavioral task
behavioral1
Sample
9a0349e7456cd62639fdd039fe218cc5c1d41964dab9c07e003351938a2b8e28.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a0349e7456cd62639fdd039fe218cc5c1d41964dab9c07e003351938a2b8e28.exe
Resource
win10v2004-20220812-en
General
-
Target
9a0349e7456cd62639fdd039fe218cc5c1d41964dab9c07e003351938a2b8e28
-
Size
349KB
-
MD5
aa45facbbe33894d5251a046bd0be164
-
SHA1
defb10841064f68b27892aa2f93f8f1e8df670a4
-
SHA256
9a0349e7456cd62639fdd039fe218cc5c1d41964dab9c07e003351938a2b8e28
-
SHA512
c5a5ec6810856f333b32c2584101c17b2a86311cc06d4ccaacf27bf3f8bc7941ce22afba40c3599fff473ebdb9b10e6bd2f3ead9273ce559c336a2c36ee7bea4
-
SSDEEP
6144:51aeB3K7MkmFfuxdgSIiTK+mqLRU4okFtSi3sM9hk0r:51ZBiGgdGzURU49ncwk0r
Malware Config
Signatures
Files
-
9a0349e7456cd62639fdd039fe218cc5c1d41964dab9c07e003351938a2b8e28.exe windows x86
e526da46652fb5ac477b130c932f202e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
CopyFileA
SetFileAttributesA
FindClose
Process32FirstW
WritePrivateProfileStringA
GetModuleFileNameA
Process32NextW
FindNextFileA
CreateToolhelp32Snapshot
CloseHandle
DeleteFileA
FreeResource
FindResourceW
GetLastError
GetModuleHandleW
WideCharToMultiByte
SizeofResource
GetFileAttributesA
MultiByteToWideChar
LockResource
CreateFileA
DeviceIoControl
SetEndOfFile
CreateFileW
OutputDebugStringW
WriteConsoleW
SetStdHandle
FindFirstFileA
CreateDirectoryA
TerminateProcess
CreateEventA
Sleep
OpenProcess
ExitProcess
GetVolumeInformationW
LocalFree
GetSystemDirectoryW
LoadResource
GetComputerNameW
LoadLibraryExW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStringTypeW
HeapFree
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetProcAddress
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsDebuggerPresent
GetModuleHandleExW
AreFileApisANSI
HeapSize
IsValidCodePage
GetACP
GetOEMCP
GetCurrentThreadId
GetStdHandle
GetFileType
GetProcessHeap
SetFilePointerEx
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
ReadConsoleW
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
user32
EnumWindows
GetWindowLongW
GetWindowThreadProcessId
PostMessageW
advapi32
CryptCreateHash
CryptAcquireContextW
CryptGetHashParam
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
ConvertSidToStringSidW
LookupAccountNameW
CryptHashData
shell32
SHGetFolderPathA
ShellExecuteA
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ