Static task
static1
Behavioral task
behavioral1
Sample
73d2ccf58d2d8b7561df06ce94464d627729cbfa06428bab4e4108dead308980.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
73d2ccf58d2d8b7561df06ce94464d627729cbfa06428bab4e4108dead308980.exe
Resource
win10v2004-20221111-en
General
-
Target
73d2ccf58d2d8b7561df06ce94464d627729cbfa06428bab4e4108dead308980
-
Size
176KB
-
MD5
e9d4c0a0075da8d99ad963ba0d36175d
-
SHA1
9ce4a2294975b698915737c5c4fe0f055f13f11d
-
SHA256
73d2ccf58d2d8b7561df06ce94464d627729cbfa06428bab4e4108dead308980
-
SHA512
14e84a7af963dc39f845ce519115d70784c49608935ccbf5fc9b1c6b1bd2498d728e6591cf4b9608e2c81aa50b1f74c887c3f368b12b5b3938323fd0777ed458
-
SSDEEP
1536:eMg97otv4lQg8HN/9SGJSMoLeuUi2cF4DfQKRx50KVT4iKEFXvxKqHs4usn8Ulcs:e2tv7twG1oLZFMfQeN/Xeyzl6I9qDB
Malware Config
Signatures
Files
-
73d2ccf58d2d8b7561df06ce94464d627729cbfa06428bab4e4108dead308980.exe windows x86
5661a6e072e20ad54ca32463fd3e90d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
UnmapViewOfFile
WriteFile
MapViewOfFile
CreateFileMappingA
CloseHandle
GetFileSize
CreateFileA
SetFileAttributesW
MultiByteToWideChar
lstrlenA
CopyFileA
DeleteFileA
GetFileTime
FindNextFileA
SetFileAttributesA
lstrcpynA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
ReleaseMutex
WaitForSingleObject
lstrcmpiA
GetModuleFileNameA
GetTempFileNameA
GetTempPathA
ReadFile
SetFilePointer
CreateDirectoryA
GetCurrentProcess
FindClose
GetLastError
ExitProcess
SetErrorMode
SetCurrentDirectoryA
GetWindowsDirectoryA
SetFileTime
SystemTimeToFileTime
CreateProcessA
GetSystemDirectoryA
CreateThread
CreateMutexA
CreateSemaphoreA
Sleep
VirtualFree
VirtualAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
GetDriveTypeA
GetLogicalDriveStringsA
ReleaseSemaphore
OpenSemaphoreA
GetComputerNameA
GetShortPathNameA
CompareStringW
SetEnvironmentVariableA
CompareStringA
SetEndOfFile
LoadLibraryA
GetOEMCP
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetSystemTime
WinExec
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
GetTimeZoneInformation
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
HeapAlloc
GetFileAttributesA
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
HeapFree
HeapReAlloc
TerminateProcess
WideCharToMultiByte
LCMapStringA
user32
PostQuitMessage
wsprintfA
ShowWindow
DialogBoxParamA
EndDialog
shell32
ShellExecuteA
ole32
CoInitialize
CoUninitialize
shlwapi
PathQuoteSpacesA
ws2_32
WSACleanup
inet_addr
gethostbyname
WSAStartup
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bmgtrre Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tgclpwn Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wkgquht Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE