Static task
static1
Behavioral task
behavioral1
Sample
9ef0ed14df1b12ac86a0d37c25571377cb362b88f9e46d02cd65296b70fcf453.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ef0ed14df1b12ac86a0d37c25571377cb362b88f9e46d02cd65296b70fcf453.exe
Resource
win10v2004-20220812-en
General
-
Target
9ef0ed14df1b12ac86a0d37c25571377cb362b88f9e46d02cd65296b70fcf453
-
Size
49KB
-
MD5
090e8e58d072624c2c40ff46ca4597a5
-
SHA1
2bb0204a6e526c73e7eaf4fb9ec482e4e06ba25a
-
SHA256
9ef0ed14df1b12ac86a0d37c25571377cb362b88f9e46d02cd65296b70fcf453
-
SHA512
85c1bad8a4e795af0649164796563eb8d1a30d8b0da495b3c6d89b3a6e78af92569ff041ab817be581f25d2e3f19c37bf093728d911e996a11b907fa081025e8
-
SSDEEP
1536:6jusLGrqmbq0kZ7toi4rRxMmHS4rctLqxPR7m:/8LtOAcIByPRC
Malware Config
Signatures
Files
-
9ef0ed14df1b12ac86a0d37c25571377cb362b88f9e46d02cd65296b70fcf453.exe windows x86
0fa6fe685c23a2022c74f093292a13c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
FindAtomA
SetEvent
HeapCreate
GetProcessHeap
CreateThread
GetDriveTypeW
LoadLibraryW
LoadLibraryA
CreateFileA
CloseHandle
ReleaseMutex
GetTickCount
lstrcpyW
LocalFree
GetComputerNameW
GetCommandLineA
GetDiskFreeSpaceW
GetLocalTime
GetFileAttributesA
user32
GetClipCursor
GetComboBoxInfo
GetKeyState
DrawStateA
GetDlgItem
CreateWindowExA
CallWindowProcA
GetClassInfoA
DestroyCaret
DispatchMessageA
CloseWindow
FillRect
SetFocus
cryptnet
CryptCancelAsyncRetrieval
CryptGetTimeValidObject
CryptGetObjectUrl
CryptUninstallCancelRetrieval
CertDllVerifyCTLUsage
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ