Static task
static1
Behavioral task
behavioral1
Sample
a9a0ce006063b70a26504d950d1041d69ad9905babe8c137f3da964d98c851fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9a0ce006063b70a26504d950d1041d69ad9905babe8c137f3da964d98c851fa.exe
Resource
win10v2004-20221111-en
General
-
Target
a9a0ce006063b70a26504d950d1041d69ad9905babe8c137f3da964d98c851fa
-
Size
856KB
-
MD5
782145e768a46335ed2bd24c378df17a
-
SHA1
f700333b61395a8e581c34403adef623faf6b3d9
-
SHA256
a9a0ce006063b70a26504d950d1041d69ad9905babe8c137f3da964d98c851fa
-
SHA512
d59ce51c08ed4dda1474c42d591ddaa06cefa30c4c2f3cb42b95a0285fb1dbbb47202a1e67865baf400af48e326ff04c3e2157db1094d8370fe3f3f39f5b229d
-
SSDEEP
24576:GNruXYcDG7AJqDrjz/mEhat2STQBviCsNv:OSYv7AUDfz/BwnQtiCs
Malware Config
Signatures
Files
-
a9a0ce006063b70a26504d950d1041d69ad9905babe8c137f3da964d98c851fa.exe windows x86
c1f84761dbb8583ce698acf436487a6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
DeleteAtom
CloseHandle
GetCurrentThreadId
CreateMailslotA
HeapDestroy
HeapCreate
GetPriorityClass
GetModuleFileNameA
FindAtomA
DeleteFileA
GetStartupInfoA
GetProcessTimes
ReadFile
GetEnvironmentVariableA
GetStdHandle
SuspendThread
GetCurrentProcessId
GetFileAttributesA
IsBadCodePtr
user32
DestroyMenu
DispatchMessageA
GetSysColor
IsWindow
GetWindowLongA
GetClassInfoA
GetWindowInfo
GetKeyState
DrawTextW
DispatchMessageA
GetClientRect
CallWindowProcW
SetFocus
fwcfg
InitHelperDll
InitHelperDll
InitHelperDll
InitHelperDll
InitHelperDll
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 846KB - Virtual size: 845KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ