Static task
static1
Behavioral task
behavioral1
Sample
1227f0530f3b1cde2d62e9b5ee17825c88edb3617df456a490878a20a5a605b5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1227f0530f3b1cde2d62e9b5ee17825c88edb3617df456a490878a20a5a605b5.exe
Resource
win10v2004-20221111-en
General
-
Target
1227f0530f3b1cde2d62e9b5ee17825c88edb3617df456a490878a20a5a605b5
-
Size
90KB
-
MD5
9d97d79fb9b0e63fb0ea817c51cb0ed4
-
SHA1
67199a2b539a5d26ed60dc09844ac4dedd283561
-
SHA256
1227f0530f3b1cde2d62e9b5ee17825c88edb3617df456a490878a20a5a605b5
-
SHA512
641d49bed714161a6c6d4d0cd46e4b07d967bb0376dd7d63d0665b50f6e54cf81a964e57833eb6977d456ce80317aa275c8b35214145b567e1bf030467a9af00
-
SSDEEP
1536:6dNMisDbZS8M+weF87FjJrPSmCFM+/JiQwwit3mrMwkWKVHF48GhRjLoAgo9s:ONMiobk8MvZBxPS1J/vwwitWrMcKVHFT
Malware Config
Signatures
Files
-
1227f0530f3b1cde2d62e9b5ee17825c88edb3617df456a490878a20a5a605b5.exe windows x86
16493664b32c2e683b814320e0084190
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
SetEnhMetaFileBits
kernel32
GetFullPathNameW
HeapCreate
CreateSemaphoreW
GlobalCompact
GetProcessHandleCount
SwitchToFiber
GetProcessId
ReplaceFileA
GetTickCount
GetLastError
SetMailslotInfo
GetCurrencyFormatA
CreateMailslotW
VirtualQuery
GlobalDeleteAtom
GetCommTimeouts
SetWaitableTimer
FileTimeToLocalFileTime
FindFirstVolumeW
WaitNamedPipeA
GetProfileSectionA
GetTempFileNameW
UpdateResourceW
CopyFileW
EnumResourceTypesA
GetNamedPipeHandleStateA
SetThreadPriority
GetConsoleCursorInfo
FlushInstructionCache
TransmitCommChar
FoldStringW
GetEnvironmentStrings
InterlockedExchangeAdd
CreateFileW
IsBadCodePtr
WriteFile
SetThreadLocale
ExitProcess
FindFirstVolumeMountPointW
GetProcAddress
CancelWaitableTimer
GetStdHandle
GetCommConfig
LoadLibraryW
WriteConsoleOutputCharacterW
DebugActiveProcessStop
OpenWaitableTimerA
GetDiskFreeSpaceA
FormatMessageW
Thread32First
GetCurrentThread
GetDevicePowerState
CreateSemaphoreA
DeleteVolumeMountPointA
WriteTapemark
EnumTimeFormatsA
SetThreadIdealProcessor
SuspendThread
GetOEMCP
LoadLibraryExA
TlsAlloc
EnumSystemLocalesW
CreateFiberEx
CreatePipe
RequestWakeupLatency
ScrollConsoleScreenBufferA
ReadConsoleOutputA
ReadConsoleW
CancelDeviceWakeupRequest
SystemTimeToTzSpecificLocalTime
GetDriveTypeA
IsBadHugeWritePtr
DeleteTimerQueueTimer
GetNumberFormatW
SetErrorMode
ExitThread
AddAtomA
user32
InvalidateRect
ole32
CoCreateInstance
msvcrt
sin
setlocale
iswascii
localeconv
perror
getc
qsort
fclose
malloc
getenv
iswcntrl
oleaut32
LPSAFEARRAY_UserMarshal
VarBoolFromI1
shell32
ExtractIconW
SHInvokePrinterCommandW
setupapi
SetupGetLineTextW
mprapi
MprAdminConnectionGetInfo
clusapi
AddClusterResourceNode
ClusterGroupCloseEnum
BackupClusterDatabase
RemoveClusterResourceDependency
ClusterRegSetValue
ClusterNetworkCloseEnum
GetClusterResourceTypeKey
ClusterRegGetKeySecurity
esent
JetRestore2
pdh
PdhParseCounterPathW
PdhCollectQueryData
PdhGetRawCounterValue
urlmon
WriteHitLogging
CoInternetCompareUrl
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ