Static task
static1
Behavioral task
behavioral1
Sample
9b9b43c9a85a71a3de34782d6d54710ad7e87ab313005960c1c5594cfd426158.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b9b43c9a85a71a3de34782d6d54710ad7e87ab313005960c1c5594cfd426158.exe
Resource
win10v2004-20220901-en
General
-
Target
9b9b43c9a85a71a3de34782d6d54710ad7e87ab313005960c1c5594cfd426158
-
Size
144KB
-
MD5
b2e4d58246515c9d4259d2645d008020
-
SHA1
586be2c30a71f98325583b5d29675481b5de0f2a
-
SHA256
9b9b43c9a85a71a3de34782d6d54710ad7e87ab313005960c1c5594cfd426158
-
SHA512
096ca85b3d06fd1df8025852eed0587a90d4edc3d0aed10bffc1e57099558a727e1afefb9830dfa6472fcac4668b871725ff2fdd25d5ba070992a5203cefe7b9
-
SSDEEP
1536:HnUbP++CYNBGZBiVektva+/xKw4FSW9tS96mCbViDgat9k09t:HEP+mGZxk5aOxb4FdvQ6igP8t
Malware Config
Signatures
Files
-
9b9b43c9a85a71a3de34782d6d54710ad7e87ab313005960c1c5594cfd426158.exe windows x86
113844eacd199c9262ba1ed6c95e6973
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
SetEndOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
CompareStringW
CompareStringA
InterlockedExchange
HeapSize
RtlUnwind
InitializeCriticalSection
SetFilePointer
VirtualQuery
GetSystemInfo
VirtualProtect
VirtualAlloc
SetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCPInfo
GetOEMCP
GetACP
UnhandledExceptionFilter
SetEnvironmentVariableW
SetEnvironmentVariableA
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
ReadFile
FileTimeToSystemTime
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
DeleteCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
GetVersionExA
CreateThread
GetCurrentThreadId
ExitThread
GetFileAttributesA
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
FindClose
FindNextFileA
FindFirstFileA
GetExitCodeThread
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetLastError
FormatMessageA
LocalFree
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameA
FindAtomW
SetFilePointerEx
GetProcessHeap
FileTimeToLocalFileTime
GetDriveTypeA
GetFullPathNameA
WriteFile
GetCurrentDirectoryA
SetUnhandledExceptionFilter
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.INIT Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 674B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ