Static task
static1
Behavioral task
behavioral1
Sample
9ec8ec67bdd6cd907b02e9e8093bd64080e5fc49c54ca5f5ef62a93d537014ea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9ec8ec67bdd6cd907b02e9e8093bd64080e5fc49c54ca5f5ef62a93d537014ea.exe
Resource
win10v2004-20221111-en
General
-
Target
9ec8ec67bdd6cd907b02e9e8093bd64080e5fc49c54ca5f5ef62a93d537014ea
-
Size
498KB
-
MD5
b59f3e3adb5fc6e24700b811d8814366
-
SHA1
cbbdb417dad418de84a6ac0b8fce370117cf4777
-
SHA256
9ec8ec67bdd6cd907b02e9e8093bd64080e5fc49c54ca5f5ef62a93d537014ea
-
SHA512
685e6296eab8bdae0d7d33a8727030c61eeae7b75b68ff906e4b53b85b2e43439bef0f1bfc79c3fa76458acb8450a62546096a740e7ca56ae56c7bbae8c829ed
-
SSDEEP
6144:ExhKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDk:ExhqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
9ec8ec67bdd6cd907b02e9e8093bd64080e5fc49c54ca5f5ef62a93d537014ea.exe windows x86
753a491ac08a841a90e76c25ede1f2aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
HeapDestroy
GetStartupInfoA
GetModuleHandleA
lstrlenA
CreateFileA
CloseHandle
GetCommandLineA
IsDebuggerPresent
ReleaseMutex
GetDriveTypeA
IsBadStringPtrW
TlsAlloc
Sleep
PulseEvent
DeviceIoControl
CreateFileMappingW
HeapCreate
GetModuleFileNameW
DeleteFileA
user32
DispatchMessageA
IsZoomed
LoadImageA
CallWindowProcW
FindWindowW
DestroyWindow
GetWindowLongA
IsWindow
DestroyMenu
DrawTextW
PeekMessageA
GetIconInfo
DispatchMessageA
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ