Static task
static1
Behavioral task
behavioral1
Sample
c9690919aef22b762c661305a0bc0c899e5f4a46876d5e1265824422bd1e3d4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c9690919aef22b762c661305a0bc0c899e5f4a46876d5e1265824422bd1e3d4c.exe
Resource
win10v2004-20220812-en
General
-
Target
c9690919aef22b762c661305a0bc0c899e5f4a46876d5e1265824422bd1e3d4c
-
Size
391KB
-
MD5
ba4c7981eb0d8d2d1cf8385d38d1b219
-
SHA1
139d3923c9eeb96c8c20c09313bd082d5e48db37
-
SHA256
c9690919aef22b762c661305a0bc0c899e5f4a46876d5e1265824422bd1e3d4c
-
SHA512
a2a07905340a4e6298bd0f351e7de2ab9f8bdb221d3e36eb18d07ac8076d5bf39db2ce499a7a58ec0f8c7f1efea8b7523c969d0551d292e9f514e1e6c6945fbe
-
SSDEEP
12288:xRMqHEAJLjpFv6w2K/PkFtlVMHFWg1EOfoMzCc3Sa0n:xRMqkAJLjpFvN/ytkjEOfoMWN
Malware Config
Signatures
Files
-
c9690919aef22b762c661305a0bc0c899e5f4a46876d5e1265824422bd1e3d4c.exe windows x86
de905d2a8af76131c0f3fe9a0ac63146
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetEnvironmentVariableW
InitializeCriticalSection
FindAtomA
HeapCreate
FindClose
LoadLibraryW
GlobalFlags
lstrlenW
GetFileTime
GetCurrentThreadId
TlsGetValue
GetCurrentProcessId
ReleaseMutex
WriteFile
ReleaseMutex
GetPrivateProfileStringA
CreateEventW
IsBadStringPtrW
LocalFree
user32
CreateWindowExA
GetClassInfoA
GetClientRect
DispatchMessageA
GetSysColor
IsWindow
GetSysColor
DrawStateW
SetFocus
CallWindowProcW
EndDialog
GetKeyboardType
DrawTextA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ