Static task
static1
Behavioral task
behavioral1
Sample
b9c8b58590286292c7a64dd59a732179ded9aa3b423551152a86a9800ca32587.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9c8b58590286292c7a64dd59a732179ded9aa3b423551152a86a9800ca32587.exe
Resource
win10v2004-20221111-en
General
-
Target
b9c8b58590286292c7a64dd59a732179ded9aa3b423551152a86a9800ca32587
-
Size
276KB
-
MD5
82792b5e976d66bf6ce31d74174e4e1f
-
SHA1
20b5fe56e90ce94f140bd192e378d840126f5691
-
SHA256
b9c8b58590286292c7a64dd59a732179ded9aa3b423551152a86a9800ca32587
-
SHA512
6ea66fb3cee116617e099b18b457315526a536c20618e506f6a49d1f0fc8a9313342c1cf9eabd4587f316d685b507d3df2943cf0e48107275ceb6ea2ac55f5df
-
SSDEEP
6144:l/1HnOBywO+PnbfMIQFSQMX0Wy6XtdFCGJvi5w:lNQuU1XXdyvGJo
Malware Config
Signatures
Files
-
b9c8b58590286292c7a64dd59a732179ded9aa3b423551152a86a9800ca32587.exe windows x86
913e409d02f20275af7ee12984334a9c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoRevertToSelf
CoGetInterfaceAndReleaseStream
CoQueryProxyBlanket
CoCreateGuid
CoSetProxyBlanket
CoCreateInstance
StringFromGUID2
CoUninitialize
CoMarshalInterThreadInterfaceInStream
CoInitializeEx
CoImpersonateClient
kernel32
RaiseException
GetACP
HeapAlloc
EnterCriticalSection
ResetEvent
CreateEventW
FindVolumeMountPointClose
HeapReAlloc
LeaveCriticalSection
CloseHandle
FindFirstVolumeMountPointW
FormatMessageW
HeapDestroy
GetDriveTypeW
SetUnhandledExceptionFilter
FindNextVolumeMountPointW
DeleteCriticalSection
CreateThread
GetVolumeNameForVolumeMountPointW
WaitForSingleObject
IsDebuggerPresent
HeapFree
GetSystemTime
lstrlenW
GetLogicalDriveStringsW
ResumeThread
HeapSize
GetThreadLocale
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetProcessHeap
GetCurrentThreadId
SetThreadLocale
TerminateThread
GetStartupInfoW
VirtualAlloc
oleaut32
SafeArrayRedim
SysStringByteLen
SafeArrayGetUBound
SafeArrayDestroy
SysStringLen
VariantCopy
VariantTimeToSystemTime
SysAllocStringLen
SafeArrayGetVartype
VariantClear
SafeArrayLock
VarBstrCmp
VariantCopyInd
SysAllocString
SafeArrayUnlock
SysFreeString
SystemTimeToVariantTime
SafeArrayCopy
SafeArrayCreate
LoadTypeLi
VariantInit
SafeArrayGetLBound
SysAllocStringByteLen
LoadRegTypeLi
advapi32
OpenProcessToken
GetTokenInformation
IsValidSid
CopySid
SetThreadToken
GetLengthSid
EqualSid
RegSetValueExW
OpenThreadToken
RegOpenKeyExW
RegCloseKey
user32
UnregisterClassA
wsprintfW
userenv
UnloadUserProfile
esent
JetCreateTable
JetGetLogInfoInstance2
JetOpenDatabase
JetStopService
JetInit
JetGetCurrentIndex
JetDupCursor
JetDBUtilities
JetAttachDatabase
JetCreateDatabase2
JetResetTableSequential
JetFreeBuffer
JetCommitTransaction
JetTerm2
jscript
DllRegisterServer
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 245KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ