Static task
static1
Behavioral task
behavioral1
Sample
b9e630e116162ff2e8bdd35db1ffa5b6c0243c9374c59127bb6885abde9e5b09.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b9e630e116162ff2e8bdd35db1ffa5b6c0243c9374c59127bb6885abde9e5b09.exe
Resource
win10v2004-20221111-en
General
-
Target
b9e630e116162ff2e8bdd35db1ffa5b6c0243c9374c59127bb6885abde9e5b09
-
Size
127KB
-
MD5
3e1e2a5abd84ca7a27083673bd8114cd
-
SHA1
7642b36fbd87e289f7fe83a9dff28a7b4d804b0f
-
SHA256
b9e630e116162ff2e8bdd35db1ffa5b6c0243c9374c59127bb6885abde9e5b09
-
SHA512
44195f27523706332b837c15e905a92d550f37bb07e1a7b947e50d62c86da3e153c366489a303ea895edc5f0077fd235d13a423fe91cb00f3dce9f5951c1ecb4
-
SSDEEP
3072:poEUgOdDfxunZ98TTXLiR4s1lbOuk2xmTDuGKqQKk:HGxfxuATbsly/2xuDXO
Malware Config
Signatures
Files
-
b9e630e116162ff2e8bdd35db1ffa5b6c0243c9374c59127bb6885abde9e5b09.exe windows x86
792287ceaf4765577c91b2a76b2be584
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ResetEvent
GetCommandLineA
GetProcessHeap
SetLastError
GetCurrentProcessId
GetACP
GetProcAddress
LocalShrink
GetExitCodeProcess
CopyFileExA
ReleaseSemaphore
GetSystemDefaultLCID
WriteFile
OpenFileMappingA
GetVersion
GlobalAlloc
PulseEvent
GetProfileStringA
LockFile
GetThreadPriority
ConnectNamedPipe
GetProcessVersion
GlobalSize
WaitForMultipleObjects
ReadConsoleA
GetPrivateProfileSectionA
IsValidCodePage
LoadLibraryA
ReadProcessMemory
GetCurrentThread
HeapCreate
GetCurrentProcess
SetFileAttributesA
CreateFileA
WriteProcessMemory
GetFileType
GetDiskFreeSpaceA
VirtualAlloc
WideCharToMultiByte
GetTempPathA
CreateDirectoryExA
Sleep
GetCPInfoExA
WaitForMultipleObjectsEx
CreateSemaphoreA
IsBadStringPtrA
GlobalUnfix
GlobalUnlock
GetCommMask
GetFileInformationByHandle
GetSystemDefaultLangID
GetFullPathNameA
GetModuleFileNameA
MapViewOfFile
GetPrivateProfileIntA
GetNamedPipeHandleStateA
HeapReAlloc
OpenEventA
FindResourceExA
GetProcessTimes
VirtualAllocEx
GetLogicalDrives
DeviceIoControl
GetThreadContext
GetLastError
CreateFileMappingA
SizeofResource
GlobalReAlloc
GetSystemDirectoryA
FindNextChangeNotification
FoldStringA
WaitNamedPipeA
MulDiv
SleepEx
GetLongPathNameA
LocalCompact
Beep
AddAtomA
LocalAlloc
GetLogicalDriveStringsA
LoadResource
CreateDirectoryA
GetProfileSectionA
EndUpdateResourceA
GetPrivateProfileStructA
GetProcessAffinityMask
VirtualLock
IsBadHugeReadPtr
GetLocalTime
ResumeThread
CancelIo
WaitForSingleObject
CreateRemoteThread
GetFileAttributesA
QueryDosDeviceA
GetMailslotInfo
GetThreadSelectorEntry
WritePrivateProfileSectionA
GetWindowsDirectoryA
FindFirstChangeNotificationA
GlobalFix
VirtualFree
GetProcessWorkingSetSize
GetOEMCP
SignalObjectAndWait
CallNamedPipeA
DeleteFileA
GetThreadTimes
WriteProfileStringA
FlushConsoleInputBuffer
CancelWaitableTimer
GetPriorityClass
FreeLibrary
GetFileSize
WritePrivateProfileStructA
IsBadReadPtr
DosDateTimeToFileTime
LoadLibraryExA
FlushInstructionCache
GlobalLock
GetProcessHeaps
GetEnvironmentVariableA
UnlockFile
GetPrivateProfileStringA
GetHandleInformation
FlushFileBuffers
GetCommConfig
MultiByteToWideChar
GetLargestConsoleWindowSize
OutputDebugStringA
ClearCommError
GetTickCount
DisconnectNamedPipe
GetDiskFreeSpaceExA
DeleteFiber
VirtualQuery
GetModuleHandleA
CommConfigDialogA
AreFileApisANSI
GlobalWire
WritePrivateProfileStringA
SetFilePointer
LocalFree
UpdateResourceA
OpenSemaphoreA
VirtualProtectEx
PeekNamedPipe
LocalLock
DeleteAtom
DefineDosDeviceA
GetStartupInfoA
msvcrt
srand
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE