Static task
static1
Behavioral task
behavioral1
Sample
9a5da515d666b85751d6deb4ca3259bb665ad5d9a90996e9e6ded57c21233267.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a5da515d666b85751d6deb4ca3259bb665ad5d9a90996e9e6ded57c21233267.exe
Resource
win10v2004-20221111-en
General
-
Target
9a5da515d666b85751d6deb4ca3259bb665ad5d9a90996e9e6ded57c21233267
-
Size
186KB
-
MD5
3305c528ae315371f403383109f80366
-
SHA1
3085228b602a060f31b991e6c5bc7107cbf94e04
-
SHA256
9a5da515d666b85751d6deb4ca3259bb665ad5d9a90996e9e6ded57c21233267
-
SHA512
9a7b72956be892b8f4bd1ec6e3f2fe87a8fd70ebb5c63a1815ec5c2eff41d7aed604057bfb3672e9d9f8f137da3f2bf43ebd09e3ebce2912d2806c97acc74b46
-
SSDEEP
3072:pMYJtJ3Ns9JtssvCTrXxUNSSh1esJg9aqmWxtFTgQlSstykklx0t+St:pMY13K9JfsrXxggtEqm6gyrg5St
Malware Config
Signatures
Files
-
9a5da515d666b85751d6deb4ca3259bb665ad5d9a90996e9e6ded57c21233267.exe windows x86
e6f398eb5ac16aaab2bd54e1b83bb468
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
mfc42
ord3738
ord815
ord561
ord4424
ord1168
ord2514
ord924
ord1199
ord801
ord5710
ord2764
ord5861
ord541
ord2621
ord1134
ord5683
ord1200
ord2817
ord6467
ord5265
ord4376
ord4853
ord4998
ord4710
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord4080
ord4622
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord641
ord324
ord4234
ord1146
ord4160
ord2863
ord6883
ord4284
ord2379
ord755
ord470
ord6699
ord3663
ord3795
ord750
ord2183
ord458
ord5450
ord6394
ord5834
ord5440
ord6383
ord6650
ord6591
ord6807
ord6857
ord6823
ord6855
ord6832
ord5261
ord6867
ord6847
ord6846
ord6858
ord6816
ord6815
ord6812
ord6845
ord1727
ord6859
ord3079
ord4899
ord4370
ord4892
ord6817
ord5076
ord4340
ord4347
ord4889
ord3830
ord3825
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord1776
ord5240
ord3748
ord1725
ord5260
ord6614
ord6691
ord4432
ord6796
ord3706
ord3571
ord3626
ord2623
ord2414
ord6805
ord1233
ord2233
ord4299
ord1768
ord2864
ord6197
ord3619
ord640
ord2405
ord6172
ord5875
ord5789
ord2452
ord2754
ord5785
ord1640
ord1641
ord323
ord2859
ord6215
ord6199
ord2065
ord1601
ord6597
ord4720
ord6514
ord6478
ord6800
ord6835
ord6814
ord6808
ord5281
ord4881
ord6839
ord4588
ord2393
ord654
ord5858
ord341
ord6662
ord6928
ord4202
ord3258
ord1265
ord3831
ord2818
ord4278
ord537
ord535
ord354
ord2915
ord5572
ord860
ord2614
ord540
ord4129
ord858
ord800
ord823
ord825
ord2985
ord2976
ord3081
ord4465
ord3262
ord3136
ord2982
ord3259
ord3147
ord5307
ord5714
ord5289
ord2725
ord4698
ord4079
ord3346
ord5302
ord5300
ord1089
ord2396
ord5199
ord2512
ord3922
ord5731
ord6375
ord2554
ord4486
ord2107
ord4274
ord4673
ord2448
ord2044
ord3903
ord941
ord2841
ord6663
ord4531
ord939
ord4545
ord6856
ord4589
ord538
ord4003
ord1176
ord1243
ord1578
ord600
ord826
ord269
ord1799
ord5602
ord2730
ord5606
ord3353
ord1576
ord3579
ord350
ord3613
ord3126
ord5651
ord3616
ord3127
ord743
ord446
ord4226
ord3979
ord6781
ord3986
ord3981
ord6143
ord6139
ord6142
ord6140
ord5857
ord5860
ord5608
ord772
ord2729
ord5603
ord2727
ord614
ord290
ord287
ord610
ord500
msvcrt
atoi
_mbscmp
_mbsicmp
_mbsnbcmp
__p___argc
__p___argv
_mbsstr
_mbsncmp
_mbschr
memset
strncpy
memmove
_except_handler3
memcpy
_CxxThrowException
memcmp
time
localtime
_controlfp
_mbsnbcat
_mbsrchr
_snprintf
strlen
__CxxFrameHandler
_mbslwr
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
strftime
_mbsnbcpy
_setmbcp
sprintf
rand
kernel32
GetTempFileNameA
WideCharToMultiByte
lstrlenW
GetThreadSelectorEntry
GetTempPathA
WinExec
GetLastError
ReadFile
GetVersionExA
VirtualQuery
CreateFileA
SetFilePointer
GetModuleFileNameA
CloseHandle
DeleteFileA
WriteFile
GetCurrentProcess
TerminateProcess
WritePrivateProfileStringA
SetUnhandledExceptionFilter
SetErrorMode
CreateProcessA
CreateDirectoryA
GetCurrentThread
GetFileAttributesExA
SetEndOfFile
UnmapViewOfFile
GetFileSize
MapViewOfFile
CreateFileMappingA
lstrcpyA
GetWindowsDirectoryA
GetShortPathNameA
lstrcatA
LocalFree
LocalAlloc
MoveFileExA
GetStartupInfoA
GetModuleHandleA
ReadProcessMemory
lstrlenA
VirtualQueryEx
MultiByteToWideChar
user32
PtInRect
wsprintfA
GetParent
IsWindow
InvalidateRect
SetCursor
ReleaseCapture
SetCapture
SetWindowRgn
LoadBitmapA
GetDC
ReleaseDC
GetDesktopWindow
ScreenToClient
PostQuitMessage
LoadCursorA
EnableWindow
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
MessageBeep
gdi32
CreateRectRgn
BitBlt
SelectObject
CreateFontIndirectA
GetStockObject
StretchBlt
GetPixel
GetObjectA
CreateCompatibleDC
CreateCompatibleBitmap
CombineRgn
CreateRectRgnIndirect
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoTaskMemAlloc
StgCreateDocfile
StgOpenStorage
CoCreateGuid
CoTaskMemFree
oleaut32
SysFreeString
imagehlp
SymInitialize
SymGetModuleInfo
StackWalk
SymFunctionTableAccess
SymLoadModule
SymSetOptions
SymGetSymFromAddr
wsock32
ntohl
htonl
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ice Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE