Static task
static1
Behavioral task
behavioral1
Sample
9e4b49e44235a02465a502ca8257628195865596c37f75828cb7253c9f792b16.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9e4b49e44235a02465a502ca8257628195865596c37f75828cb7253c9f792b16.exe
Resource
win10v2004-20221111-en
General
-
Target
9e4b49e44235a02465a502ca8257628195865596c37f75828cb7253c9f792b16
-
Size
305KB
-
MD5
33fb9e7fa1ac7d0d012761697047b65e
-
SHA1
994780411a8a2e3f6942e204dcded63d907d544e
-
SHA256
9e4b49e44235a02465a502ca8257628195865596c37f75828cb7253c9f792b16
-
SHA512
0dfde43c8f6735cfc2bbead3b5011ce81d3b41228daa32e9164e4ec3021a538567226ff4a786b86d8b8bc13d09a4ffbc874fbaa926a3b8b1adeb72c86c4c503c
-
SSDEEP
6144:MmL2lnHHnHrLrLLrLrDKAfcswil3327KJyxzXJhJiWo21BPK0hpHiGjgaMpDMB:zLDoCO33279DJiU1BK0XHngayD8
Malware Config
Signatures
Files
-
9e4b49e44235a02465a502ca8257628195865596c37f75828cb7253c9f792b16.exe windows x86
b8c0ffffb4b0f54f2974148eb66ec618
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
CreateFileMappingW
GetStringTypeA
DeleteFileA
LoadLibraryA
DeviceIoControl
VirtualAlloc
SetVolumeLabelW
CreatePipe
CreateMailslotA
CreateSemaphoreW
GetModuleHandleW
GetACP
GetShortPathNameW
SetEnvironmentVariableA
FatalExit
WriteConsoleW
InitializeCriticalSection
GetConsoleAliasA
GetStringTypeW
DeleteFileA
SetCurrentDirectoryA
DeleteFileA
mshtml
DllEnumClassObjects
ShowHTMLDialog
ShowModalDialog
ShowModelessHTMLDialog
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ