Static task
static1
Behavioral task
behavioral1
Sample
b9f63f212718d9e961ac919c0fb8ba3bc7984f6eb7e0cf6c29ea9f632e2fc48d.exe
Resource
win7-20220812-en
General
-
Target
b9f63f212718d9e961ac919c0fb8ba3bc7984f6eb7e0cf6c29ea9f632e2fc48d
-
Size
83KB
-
MD5
83783be423d521a485eec93322674760
-
SHA1
a3165e17bb1460f45c479ca1d7e13c7e8f9f7c4e
-
SHA256
b9f63f212718d9e961ac919c0fb8ba3bc7984f6eb7e0cf6c29ea9f632e2fc48d
-
SHA512
cf8df05dd9e682ff5124431f6fcd1581725e4c315784fcb7de0a26bdbf9fd7e3c813bd99e469aca67835e6f4d0a75909c6f3f6fd56ca503737026bddac4b27a6
-
SSDEEP
1536:eKWJlzq+5hRpfvY7I7rPm4mzIOmfqTLf0hR0nEPTMuPo60v9upE5LYNF1SVwvefe:eKev7lmzIOCqv+R/Z0v9upE58MVwvie
Malware Config
Signatures
Files
-
b9f63f212718d9e961ac919c0fb8ba3bc7984f6eb7e0cf6c29ea9f632e2fc48d.exe windows x86
b2fba6c8185256636c567d485f76cbec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strncpy
memcpy
fopen
fseek
fclose
strlen
strcpy
strcat
_CIasin
floor
ceil
_CIpow
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
Sleep
FreeLibrary
HeapAlloc
HeapFree
GetCurrentProcessId
GetCurrentThreadId
LoadLibraryA
GetProcAddress
HeapReAlloc
user32
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
GetWindowLongA
IsWindowEnabled
EnableWindow
EnumWindows
SetWindowPos
comdlg32
GetSaveFileNameA
GetOpenFileNameA
comctl32
InitCommonControlsEx
ole32
CoInitialize
odbc32
SQLDataSources
SQLFreeHandle
SQLAllocHandle
SQLDisconnect
SQLNumResultCols
SQLFetchScroll
SQLGetData
SQLFetch
Sections
.code Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE