Static task
static1
Behavioral task
behavioral1
Sample
9f4e829a3dd5db81ec8c128bd1d1a8d0e9c8e84ec5c17236a8b73c991d77bcdd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9f4e829a3dd5db81ec8c128bd1d1a8d0e9c8e84ec5c17236a8b73c991d77bcdd.exe
Resource
win10v2004-20220901-en
General
-
Target
9f4e829a3dd5db81ec8c128bd1d1a8d0e9c8e84ec5c17236a8b73c991d77bcdd
-
Size
109KB
-
MD5
378b4cdf80e55192a5997029a21e9d42
-
SHA1
0dcf0911d71704a6075ab3b269494317d06fe9d1
-
SHA256
9f4e829a3dd5db81ec8c128bd1d1a8d0e9c8e84ec5c17236a8b73c991d77bcdd
-
SHA512
82aef8437c5d3e07aeed5e2a5faee23e4bb1c80211e48fbaafc4035671fd90d710a5ef6f84e391da00311ae41c0a48a55a9e7351ad67c2e52e8dd63172a7c66c
-
SSDEEP
3072:0WwVFEDVzzE/e6Z16NcQYCJKEW4utBeiP:0tVq/E/tZ1ecQQEfud
Malware Config
Signatures
Files
-
9f4e829a3dd5db81ec8c128bd1d1a8d0e9c8e84ec5c17236a8b73c991d77bcdd.exe windows x86
9125c86d3c4ba40f48d662ed12cd1c8d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetTempPathA
GetModuleHandleA
SetHandleCount
GetVersionExW
lstrcpynA
GetShortPathNameA
GetModuleFileNameA
GetUserDefaultLangID
ExitProcess
GetStdHandle
GetFileType
VirtualProtect
CompareFileTime
lstrcmpiW
GetSystemDirectoryW
DeleteFileW
FileTimeToDosDateTime
GlobalHandle
GetExitCodeProcess
SetFilePointer
GetVersionExA
GetConsoleOutputCP
lstrcmpA
DeleteFileA
IsDebuggerPresent
GetCPInfo
RemoveDirectoryA
GetThreadLocale
GetFileAttributesA
lstrcpyA
WaitForMultipleObjects
SystemTimeToFileTime
GetOEMCP
SetLastError
GetModuleHandleW
TerminateProcess
lstrlenW
LoadResource
GetLastError
FreeEnvironmentStringsW
SetCurrentDirectoryA
GetDateFormatA
GetFileAttributesW
GetEnvironmentStringsW
LocalFree
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__setusermatherr
_initterm
_controlfp
_exit
_except_handler3
__p___initenv
__set_app_type
_adjust_fdiv
user32
GetMessagePos
GetDesktopWindow
SendDlgItemMessageA
InflateRect
SystemParametersInfoA
GetClientRect
LoadIconA
OemToCharA
DrawEdge
ReleaseDC
SetScrollPos
GetMenuState
RemovePropA
GetCursorPos
DefWindowProcA
SetRect
UnhookWindowsHookEx
EmptyClipboard
MessageBeep
GetLastActivePopup
WinHelpA
FrameRect
TrackPopupMenu
GetSystemMenu
EndPaint
IsChild
RedrawWindow
MessageBoxA
InvalidateRect
ScreenToClient
GetDlgItem
GetMenuStringA
GetClassNameA
GetIconInfo
IsDialogMessageA
GetFocus
GetScrollPos
advapi32
CryptGenRandom
SetSecurityDescriptorDacl
GetUserNameA
AllocateAndInitializeSid
LookupPrivilegeValueW
InitializeSecurityDescriptor
DeregisterEventSource
RegCreateKeyExW
OpenServiceA
RegOpenKeyA
InitializeAcl
SetSecurityDescriptorOwner
RegEnumKeyA
RegOpenKeyExA
IsValidSid
ControlService
OpenProcessToken
CheckTokenMembership
InitiateSystemShutdownA
SetSecurityDescriptorGroup
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegQueryValueA
OpenSCManagerA
CryptDestroyHash
RegFlushKey
DeleteService
CryptCreateHash
RegCloseKey
RegSetValueExA
RegEnumKeyW
GetLengthSid
RegEnumKeyExW
AddAccessAllowedAce
Sections
.text Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ