Static task
static1
Behavioral task
behavioral1
Sample
9fe2d8f69a423a65d97f2e998db6dffb84cf22f2c9e829141df8415003f92d84.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9fe2d8f69a423a65d97f2e998db6dffb84cf22f2c9e829141df8415003f92d84.exe
Resource
win10v2004-20220901-en
General
-
Target
9fe2d8f69a423a65d97f2e998db6dffb84cf22f2c9e829141df8415003f92d84
-
Size
148KB
-
MD5
17a0beababcaaf694955ff4ee45c70e1
-
SHA1
0571a3ec1fb49547742f8f1bd29bf26b18cdba81
-
SHA256
9fe2d8f69a423a65d97f2e998db6dffb84cf22f2c9e829141df8415003f92d84
-
SHA512
fc057021afe0a9585a3d64db7b88c54fec583f4db91441389090dff95a104452549b93181312a320f2ddd6a827f5f42048aca4463c2f5940508130320c0ea9d4
-
SSDEEP
3072:phPsX1IZ1UXAD3MKqw17UB7GRHSgS3lf5XVKTfzyY9aJw:DsQRiFvBVQt9a
Malware Config
Signatures
Files
-
9fe2d8f69a423a65d97f2e998db6dffb84cf22f2c9e829141df8415003f92d84.exe windows x86
a97f0476137dafe641c0c4f6d2686b88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetDiskFreeSpaceA
MulDiv
GetFileTime
SetFileAttributesW
SetStdHandle
GetTempFileNameA
GetStartupInfoA
CreateDirectoryA
ExpandEnvironmentStringsA
VirtualProtect
GetModuleHandleA
lstrcpyA
GetLocaleInfoA
GetSystemDirectoryW
GetEnvironmentStringsW
LCMapStringA
user32
GetSysColor
SendDlgItemMessageA
SetWindowPos
WinHelpA
GetIconInfo
MapWindowPoints
GetWindowThreadProcessId
DrawEdge
SetFocus
CallNextHookEx
SetWindowPlacement
msvcrt
log10
_except_handler3
_CIsqrt
_adjust_fdiv
fgetc
__p__commode
__setusermatherr
__getmainargs
_read
strcmp
_acmdln
exit
__p__fmode
_initterm
__p___initenv
_XcptFilter
__set_app_type
abort
advapi32
CryptGenRandom
OpenServiceA
CryptAcquireContextA
RegCloseKey
LookupPrivilegeValueA
oleaut32
SafeArrayRedim
SysAllocStringByteLen
SetErrorInfo
LoadTypeLib
SysReAllocStringLen
SafeArrayGetElement
GetActiveObject
VariantInit
comctl32
ImageList_LoadImageA
ImageList_SetDragCursorImage
ole32
PropVariantClear
IIDFromString
CreateStreamOnHGlobal
StgOpenStorageOnILockBytes
RevokeDragDrop
StringFromIID
shell32
ExtractIconExW
SHGetPathFromIDList
SHChangeNotify
SHGetFileInfo
DragQueryFileA
SHGetSettings
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
SHGetPathFromIDListA
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE