Static task
static1
Behavioral task
behavioral1
Sample
a9050fce77215c7acabafb698f9a3513aa2ce2fa12b2798c5875d12b9a426b37.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9050fce77215c7acabafb698f9a3513aa2ce2fa12b2798c5875d12b9a426b37.exe
Resource
win10v2004-20220812-en
General
-
Target
a9050fce77215c7acabafb698f9a3513aa2ce2fa12b2798c5875d12b9a426b37
-
Size
105KB
-
MD5
e34caf0d5c9a92601be196a9c583b540
-
SHA1
900271a8e17609b8588bdee00309ffa19dd473d4
-
SHA256
a9050fce77215c7acabafb698f9a3513aa2ce2fa12b2798c5875d12b9a426b37
-
SHA512
bdcab577ae7fba49dfebc0f496a402e55083e914b1f470ea7f51ad5a582c84a856b3d70f8d10e156ee04073770b00e860d1094f9f34b4e7f05c97ee124d94cd2
-
SSDEEP
1536:iJPmAHnTcXKD0IhojSE9fkyIf6hq5vhaGbihPTMDIdCOgl8moNWZn2y5rkINQBEB:ipmKYXvRSmkxf6hQPRGgemFXkOEE
Malware Config
Signatures
Files
-
a9050fce77215c7acabafb698f9a3513aa2ce2fa12b2798c5875d12b9a426b37.exe windows x86
5d1e4a91d432c9eb6d69554b27071678
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
CStdStubBuffer_Disconnect
RpcServerUseProtseqEpW
RpcStringFreeA
NdrDllUnregisterProxy
CStdStubBuffer_Invoke
IUnknown_Release_Proxy
UuidFromStringW
NdrClientCall2
CStdStubBuffer_Connect
RpcStringFreeW
NdrOleFree
UuidToStringA
RpcBindingVectorFree
CStdStubBuffer_CountRefs
RpcImpersonateClient
CStdStubBuffer_IsIIDSupported
NdrCStdStubBuffer_Release
RpcBindingSetAuthInfoExW
NdrCStdStubBuffer2_Release
NdrStubCall2
NdrOleAllocate
RpcServerUnregisterIf
RpcStringBindingComposeW
CStdStubBuffer_AddRef
RpcServerRegisterAuthInfoW
CStdStubBuffer_QueryInterface
RpcEpResolveBinding
RpcBindingSetAuthInfoW
RpcBindingFromStringBindingW
kernel32
InterlockedIncrement
CreateFileW
GlobalFree
GetStartupInfoA
FormatMessageA
GetFullPathNameW
VirtualAlloc
IsBadWritePtr
SystemTimeToFileTime
CreateDirectoryA
FindClose
GetProcAddress
GetStringTypeA
GetWindowsDirectoryA
OutputDebugStringA
DisableThreadLibraryCalls
lstrcpynW
GetSystemDirectoryA
ExitProcess
CreateProcessW
lstrcmpA
FileTimeToSystemTime
oleaut32
SafeArrayCreate
SafeArrayGetUBound
VariantCopyInd
VariantChangeType
VariantInit
CreateErrorInfo
SafeArrayPtrOfIndex
VariantClear
SafeArrayPutElement
VariantCopy
LoadTypeLib
SysAllocStringByteLen
SysAllocStringLen
SysReAllocStringLen
SysFreeString
SafeArrayUnaccessData
GetActiveObject
OleLoadPicture
RegisterTypeLib
SafeArrayGetLBound
GetErrorInfo
SafeArrayAccessData
SysStringLen
SysStringByteLen
ole32
OleSaveToStream
CreateBindCtx
MkParseDisplayName
CoRevertToSelf
CoInitializeEx
CLSIDFromProgID
OleInitialize
WriteClassStm
PropVariantClear
CoGetMalloc
StringFromCLSID
OleRegEnumVerbs
StgIsStorageFile
CoCreateInstance
StgCreateDocfile
CoReleaseMarshalData
CoRegisterClassObject
ProgIDFromCLSID
OleLoadFromStream
CoCreateFreeThreadedMarshaler
StringFromIID
OleRun
CoSetProxyBlanket
CoTaskMemFree
CoGetInterfaceAndReleaseStream
StringFromGUID2
CoFreeUnusedLibraries
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 63KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE