Static task
static1
Behavioral task
behavioral1
Sample
9f698ebc81ea1588abb67961744c47c07490bf1117baedb273f8f91f7d6a1bb9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f698ebc81ea1588abb67961744c47c07490bf1117baedb273f8f91f7d6a1bb9.exe
Resource
win10v2004-20221111-en
General
-
Target
9f698ebc81ea1588abb67961744c47c07490bf1117baedb273f8f91f7d6a1bb9
-
Size
9KB
-
MD5
b2d1351b1de212b56fb72853807068db
-
SHA1
0b9440b511f358e169ae4600e01658f332170fde
-
SHA256
9f698ebc81ea1588abb67961744c47c07490bf1117baedb273f8f91f7d6a1bb9
-
SHA512
bd8a5a1016d37bea32cee3afc0001d648f8b398508b6f296f8164bfcf6bc6299e9ecb86fd8375bacf8eab4853a032f7e87a57599daaf0fd61328c391f704c6aa
-
SSDEEP
192:Fi+K6SRpzIS8q9lJM+a9D95360u/Ivn4s9NL7w:FeB0Sv09TZ4s9Nfw
Malware Config
Signatures
Files
-
9f698ebc81ea1588abb67961744c47c07490bf1117baedb273f8f91f7d6a1bb9.exe windows x86
a1084e27ccd4892b17368449205b7dd7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strlen
memmove
kernel32
GetModuleHandleA
HeapCreate
GetCurrentThreadId
HeapDestroy
ExitProcess
GetModuleFileNameA
TlsAlloc
HeapAlloc
TlsSetValue
GetTickCount
TlsGetValue
FreeLibrary
HeapFree
LoadLibraryA
GetProcAddress
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
HeapReAlloc
WaitForMultipleObjects
CloseHandle
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
GetInputState
PostThreadMessageA
GetMessageA
Sections
.code Size: 1024B - Virtual size: 878B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ