Static task
static1
Behavioral task
behavioral1
Sample
c9ff4b59ce0c31c31c939ccb026e68a76e708a418c1bafee0ef1a2cae755ec0b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c9ff4b59ce0c31c31c939ccb026e68a76e708a418c1bafee0ef1a2cae755ec0b.exe
Resource
win10v2004-20221111-en
General
-
Target
c9ff4b59ce0c31c31c939ccb026e68a76e708a418c1bafee0ef1a2cae755ec0b
-
Size
76KB
-
MD5
f4c60bf42650fa9995d26de1bb350088
-
SHA1
2086bc2ff41635eda2cc68d16396d9513681a698
-
SHA256
c9ff4b59ce0c31c31c939ccb026e68a76e708a418c1bafee0ef1a2cae755ec0b
-
SHA512
591ccf8fa6b9f57de1d7ad281f130e0a3ae8cc7b6e629551b674d0c3cf1538c48e620319285efe7ef0e9f59ecebdc18482688aa4e73c3b9c659f9d18bcd42569
-
SSDEEP
1536:vYqhTcnLEzBa/qbxArZ9hds7x3lEh1AgM2vu:vY0ELEzYRLdozEP3y
Malware Config
Signatures
Files
-
c9ff4b59ce0c31c31c939ccb026e68a76e708a418c1bafee0ef1a2cae755ec0b.exe windows x86
8bb3095750234ce74187cfc8b5f38d27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareFileTime
GetModuleHandleA
GetTempPathA
LoadResource
GetWindowsDirectoryA
DeviceIoControl
SizeofResource
InterlockedCompareExchange
GlobalLock
GetThreadLocale
GlobalAlloc
GetStringTypeA
GetFullPathNameA
GlobalHandle
GetExitCodeProcess
GetDriveTypeA
SetFileTime
GetModuleFileNameW
VirtualFree
GetStartupInfoA
MoveFileA
DeleteFileA
GetLocaleInfoA
SetEnvironmentVariableA
GetProcAddress
RtlUnwind
IsBadReadPtr
GetCurrentThread
MultiByteToWideChar
VirtualProtect
RtlMoveMemory
GetTickCount
WideCharToMultiByte
GetPrivateProfileStringA
msvcrt
_except_handler3
__p__fmode
_exit
_adjust_fdiv
_initterm
__getmainargs
_XcptFilter
_controlfp
__set_app_type
__p___initenv
__p__commode
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ