Static task
static1
Behavioral task
behavioral1
Sample
9029daf9e9873834fbf839c578008e59be3545d56d56352efbcf388f35a044d8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9029daf9e9873834fbf839c578008e59be3545d56d56352efbcf388f35a044d8.exe
Resource
win10v2004-20220901-en
General
-
Target
9029daf9e9873834fbf839c578008e59be3545d56d56352efbcf388f35a044d8
-
Size
30KB
-
MD5
403eab98081def55c26101efa1af74ca
-
SHA1
1999cc99785206a2697cafcece1176ec5cc6f2ca
-
SHA256
9029daf9e9873834fbf839c578008e59be3545d56d56352efbcf388f35a044d8
-
SHA512
925d7721a21b776b50e2633403da3222659c5ebe4264d227f609bf79cc594f918a670a38f0ff13381d06f45b061f2f0b66896fed65aaa3d8eabb0a9c982acbb1
-
SSDEEP
384:Td7z098Qj4szLrW2T/5Yps0Y8UH0hp4ZfqQY+HZiP82R1ZeqlIXl2zXIf:SBR175Es0PUH0EYlXlIV2
Malware Config
Signatures
Files
-
9029daf9e9873834fbf839c578008e59be3545d56d56352efbcf388f35a044d8.exe windows x86
c7d368d29e9026ea901869759b6af4c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
AllocConsole
ReadConsoleOutputAttribute
IsBadReadPtr
InterlockedIncrement
WriteProfileStringA
WriteFile
HeapUnlock
GetHandleInformation
FindVolumeMountPointClose
SetProcessAffinityMask
IsBadReadPtr
GetProcessVersion
BuildCommDCBA
GetCommandLineA
ExitProcess
GetStartupInfoA
Sections
icode Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
idata Size: 22KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ