Static task
static1
Behavioral task
behavioral1
Sample
9a90252c341bdbf6915b30f60cfae078872817f42ee6def8467ee1c51aaa7bc8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9a90252c341bdbf6915b30f60cfae078872817f42ee6def8467ee1c51aaa7bc8.exe
Resource
win10v2004-20221111-en
General
-
Target
9a90252c341bdbf6915b30f60cfae078872817f42ee6def8467ee1c51aaa7bc8
-
Size
127KB
-
MD5
537cb4b23134563e68a5cb8394978fb6
-
SHA1
6694f8734bc6fbd7b574928caf7b944c095da608
-
SHA256
9a90252c341bdbf6915b30f60cfae078872817f42ee6def8467ee1c51aaa7bc8
-
SHA512
df99f29a17fa31a0aa3597605ad486836495406c6b59fae7c9410504134a245afc44f1d1e57ab604d9755f4cfe8c071158ba1295835b771d568bdb4017302944
-
SSDEEP
3072:ggJ1xy2o+E5HgemzrJZMA10QPCN468yXyrlcU3xAAj9boi:gADm3qXMADy46h0ztBbh
Malware Config
Signatures
Files
-
9a90252c341bdbf6915b30f60cfae078872817f42ee6def8467ee1c51aaa7bc8.exe windows x86
3925ba244772bedc66f86af9c4fd4d99
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetThreadSelectorEntry
OutputDebugStringA
GetProcAddress
GetFileSize
GetLogicalDrives
VirtualProtect
FindClose
LocalLock
CreateSemaphoreA
ReadConsoleA
GlobalUnfix
GlobalUnlock
CancelIo
UnmapViewOfFile
GetModuleFileNameA
GetCurrentProcessId
GetPrivateProfileStructA
GetProcessAffinityMask
GetShortPathNameA
VirtualFree
SleepEx
DeleteAtom
GetFileInformationByHandle
GlobalFlags
GetOEMCP
GetNamedPipeHandleStateA
GetACP
WaitForMultipleObjectsEx
FreeLibrary
GetThreadPriority
WaitForSingleObjectEx
ReadFile
GetThreadPriorityBoost
VirtualQuery
HeapCreate
GetEnvironmentStrings
GetConsoleCP
HeapFree
OpenMutexA
OpenProcess
SetEvent
GetProfileStringA
GetBinaryTypeA
IsBadReadPtr
GetPrivateProfileStringA
ConnectNamedPipe
ContinueDebugEvent
FindCloseChangeNotification
GlobalCompact
GetCPInfo
GetConsoleOutputCP
WaitForMultipleObjects
WriteProfileSectionA
RemoveDirectoryA
Beep
FindResourceA
GetEnvironmentVariableA
SearchPathA
GetProfileIntA
GetDiskFreeSpaceA
GetCurrentThread
DeleteFileA
WriteProcessMemory
LocalReAlloc
GlobalUnWire
WriteFile
GetProcessHeap
HeapAlloc
HeapReAlloc
GetFileAttributesA
LockFile
GlobalHandle
GetLargestConsoleWindowSize
MapViewOfFileEx
DeleteFiber
WaitNamedPipeA
MoveFileExA
GetCommandLineA
GetProcessHeaps
IsBadHugeReadPtr
GetCommMask
CreateConsoleScreenBuffer
IsBadWritePtr
MulDiv
GlobalFree
GetLongPathNameA
WideCharToMultiByte
LocalAlloc
MoveFileA
IsDebuggerPresent
GetUserDefaultLangID
VirtualAllocEx
SetFilePointer
GetDiskFreeSpaceExA
LocalCompact
WritePrivateProfileStructA
GetDriveTypeA
FormatMessageA
GetProcessWorkingSetSize
GetLocalTime
OpenSemaphoreA
FlushViewOfFile
AreFileApisANSI
LoadLibraryExA
GetProcessVersion
CreateIoCompletionPort
GetFullPathNameA
GetModuleHandleA
LocalUnlock
GetCPInfoExA
PostQueuedCompletionStatus
LocalFree
LocalHandle
GlobalAlloc
GetStdHandle
FindAtomA
SetFileTime
LocalSize
GetCommModemStatus
UnlockFile
PurgeComm
SizeofResource
UpdateResourceA
PulseEvent
FlushInstructionCache
VirtualAlloc
CreateFileA
CommConfigDialogA
IsBadCodePtr
GlobalFindAtomA
IsBadStringPtrA
DefineDosDeviceA
GetCurrentProcess
GetWindowsDirectoryA
GetProcessTimes
LockResource
GetThreadContext
GetPriorityClass
MultiByteToWideChar
GetStartupInfoA
msvcrt
srand
rand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE