Static task
static1
Behavioral task
behavioral1
Sample
9138a4d0d45169be41a704d0d11b2efdb2853c024d0ccac30dccf3c4d9f3ca9c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9138a4d0d45169be41a704d0d11b2efdb2853c024d0ccac30dccf3c4d9f3ca9c.exe
Resource
win10v2004-20220812-en
General
-
Target
9138a4d0d45169be41a704d0d11b2efdb2853c024d0ccac30dccf3c4d9f3ca9c
-
Size
87KB
-
MD5
3499fb70e6996fa855b84132bb06f513
-
SHA1
5df23f4b7ee88536ba6d4093a00a5a50dc002389
-
SHA256
9138a4d0d45169be41a704d0d11b2efdb2853c024d0ccac30dccf3c4d9f3ca9c
-
SHA512
5cb6cbdb6820ea7b1fdd47fc47dcebb7f8ce39eb756aadcec12fc663bde99bb23066a9b46053af6f4306efeffeec8abe1743d99e351b1cbe427b27c1b20b9a04
-
SSDEEP
1536:jlMmIQJ1yDSCOm2N/NW9AEtT9ymqM8E04BiscLzuyey0:hMyCOm2nTcTkM8E04BLcLyyeX
Malware Config
Signatures
Files
-
9138a4d0d45169be41a704d0d11b2efdb2853c024d0ccac30dccf3c4d9f3ca9c.exe windows x86
f52a3f9a247060eed0beaa32f238b910
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
CreateFileA
SetFilePointer
ReadFile
WriteFile
GetModuleFileNameW
CreateFileW
GetFileSize
GetVolumeInformationW
lstrcatW
CreateMutexW
GetLastError
WaitForSingleObject
GetModuleFileNameA
lstrcatA
OpenProcess
lstrcpyA
CloseHandle
GetCurrentProcess
MoveFileExW
InterlockedDecrement
FlushFileBuffers
GetStringTypeW
LCMapStringW
WriteConsoleW
SetStdHandle
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
LoadLibraryW
EnterCriticalSection
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
LocalFree
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
EncodePointer
DecodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
IsProcessorFeaturePresent
GetProcAddress
GetModuleHandleW
ExitProcess
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
Sleep
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
LeaveCriticalSection
user32
LoadStringA
wsprintfA
advapi32
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CLSIDFromProgID
oleaut32
SysAllocString
GetErrorInfo
SysAllocStringByteLen
VariantClear
VariantCopy
VariantInit
SysFreeString
SysStringByteLen
psapi
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
urlmon
URLDownloadToFileA
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ