Static task
static1
Behavioral task
behavioral1
Sample
a9a9641d362dae5a6e749899444bdcefa130244dbd26921535e885a5bd2c34d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9a9641d362dae5a6e749899444bdcefa130244dbd26921535e885a5bd2c34d2.exe
Resource
win10v2004-20221111-en
General
-
Target
a9a9641d362dae5a6e749899444bdcefa130244dbd26921535e885a5bd2c34d2
-
Size
176KB
-
MD5
42fa32df9ec5b6e05e7e13a21ae59664
-
SHA1
71306203f2539152a6c55d9d32d1548496a7e0fa
-
SHA256
a9a9641d362dae5a6e749899444bdcefa130244dbd26921535e885a5bd2c34d2
-
SHA512
4489da20a1f10d83cb23bdaae4dcbeeec0b01f3a12916e12660529b3e3d9f2d32a61992a08e7796bfc352793bf960af6cb86fc586c361d2e16b3595986f10653
-
SSDEEP
3072:D7VsO4IucgqMc6CFJtx94gKVupO/nrMBqCqa5liyTF10Cd3oe1goYc:3Vz4vPqWCHHKVD/gqba5liu10CdN+nc
Malware Config
Signatures
Files
-
a9a9641d362dae5a6e749899444bdcefa130244dbd26921535e885a5bd2c34d2.exe windows x86
5ce188716bf436bebce17bcbc87b1ed0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetModuleFileNameA
CreateDirectoryA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrlenA
lstrcpyA
SetErrorMode
GetFileAttributesA
FindNextFileA
FindFirstFileA
lstrcatA
FindClose
GetCurrentDirectoryA
GetLocaleInfoW
SetEndOfFile
CopyFileA
SetFileAttributesA
lstrcmpA
GetDriveTypeA
SleepEx
GetLogicalDriveStringsA
GetVolumeInformationA
CreateProcessA
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
HeapReAlloc
TerminateProcess
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
GetLastError
WriteFile
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
ReadFile
GetACP
GetOEMCP
CreateFileA
SetEnvironmentVariableA
user32
ExitWindowsEx
FindWindowA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyA
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE