Static task
static1
Behavioral task
behavioral1
Sample
d9571ab95deb8056051c593f2ac8f978b4b53de0a82d7a86437548d333274cd7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d9571ab95deb8056051c593f2ac8f978b4b53de0a82d7a86437548d333274cd7.exe
Resource
win10v2004-20221111-en
General
-
Target
d9571ab95deb8056051c593f2ac8f978b4b53de0a82d7a86437548d333274cd7
-
Size
167KB
-
MD5
a9679f4ddffc964476db6f9728681fca
-
SHA1
a15f784c3f5dd103eafc48544a9d61a4be8627d7
-
SHA256
d9571ab95deb8056051c593f2ac8f978b4b53de0a82d7a86437548d333274cd7
-
SHA512
b6079fcf57cd82de0b777a0095eebb7ea170d4daf2d020e86028a75b1ff795538e5c1a96596171172f010c74695ccbf99bb9e8a3a9c1ab5cae10ebefb3599718
-
SSDEEP
3072:LMaQ0GmJPxD5MFt+lbJuDGaapnyDargAdiEN:LMaQ0GmJtefANaapnyDE
Malware Config
Signatures
Files
-
d9571ab95deb8056051c593f2ac8f978b4b53de0a82d7a86437548d333274cd7.exe windows x86
1d39e878acfac8bb69899584d6511d4e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
FreeLibrary
OpenProcess
Beep
Sleep
TerminateProcess
LoadLibraryA
GetProcAddress
GetStdHandle
FlushFileBuffers
SetHandleCount
InterlockedDecrement
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
VirtualAlloc
HeapFree
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
DeleteFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCurrentProcess
DebugBreak
CloseHandle
WriteFile
HeapAlloc
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
GetFileAttributesA
GetEnvironmentStrings
HeapReAlloc
GetFileType
IsBadWritePtr
IsBadReadPtr
HeapValidate
SetFilePointer
ReadFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
HeapCreate
VirtualFree
RtlUnwind
SetConsoleCtrlHandler
SetStdHandle
GetCurrentProcessId
FreeLibrary
OpenProcess
Beep
Sleep
TerminateProcess
LoadLibraryA
GetProcAddress
GetStdHandle
FlushFileBuffers
SetHandleCount
InterlockedDecrement
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
VirtualAlloc
HeapFree
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
DeleteFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCurrentProcess
DebugBreak
CloseHandle
WriteFile
HeapAlloc
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
GetFileAttributesA
GetEnvironmentStrings
HeapReAlloc
GetFileType
IsBadWritePtr
IsBadReadPtr
HeapValidate
SetFilePointer
ReadFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
HeapCreate
VirtualFree
RtlUnwind
SetConsoleCtrlHandler
SetStdHandle
user32
MessageBoxA
advapi32
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
wsock32
closesocket
WSAStartup
socket
htons
bind
WSACleanup
gethostname
listen
accept
recv
send
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ