Static task
static1
Behavioral task
behavioral1
Sample
9a0c170fe0ada3c36eb6ecb4323503cf33f08251412675f1116fa59bd3c54490.exe
Resource
win7-20221111-en
General
-
Target
9a0c170fe0ada3c36eb6ecb4323503cf33f08251412675f1116fa59bd3c54490
-
Size
188KB
-
MD5
7af56d1903ac5914086f549ecbf8f188
-
SHA1
6ac00f09d0dd04303ffaeda1b538df5dfc65581b
-
SHA256
9a0c170fe0ada3c36eb6ecb4323503cf33f08251412675f1116fa59bd3c54490
-
SHA512
26ae87449af47905f04d29e33d08918402bad452e24e25ff9f1d96a014e5c8c963b403ced99977435ab1bff8a65aaad0b0bb3591cc41a4e2616af0f11ceb807b
-
SSDEEP
3072:IL8zUgHEmLliiduT2UBGRj9nwE+ffHA3QR3gVZBrtOBm8djcLJsAcQamcezOT:IYUgHNLtu3URj9mvAgR3qrYmEjcLJVcx
Malware Config
Signatures
Files
-
9a0c170fe0ada3c36eb6ecb4323503cf33f08251412675f1116fa59bd3c54490.exe windows x86
8992e62c627d446a1d8ec51e660f6aee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
shell32
ShellExecuteA
Shell_NotifyIconA
shlwapi
GetAcceptLanguagesA
UrlCreateFromPathW
PathCreateFromUrlW
PathIsRelativeW
StrCmpIW
PathRemoveFileSpecW
UrlUnescapeW
PathAppendW
PathFindExtensionW
PathCombineW
rpcrt4
UuidCreate
kernel32
GetTickCount
GetCurrentProcess
QueryPerformanceCounter
GlobalFindAtomW
GetProcessHeap
SetUnhandledExceptionFilter
GetStartupInfoA
LocalAlloc
VirtualProtect
GetModuleHandleW
IsDebuggerPresent
GetCurrentProcessId
EnumResourceLanguagesA
InterlockedCompareExchange
UnhandledExceptionFilter
GetCurrentThreadId
InterlockedExchange
GetPrivateProfileIntW
TerminateProcess
GetLocaleInfoW
GetSystemTimeAsFileTime
FoldStringW
DeleteFileW
Sections
.text Size: 93KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ