Static task
static1
Behavioral task
behavioral1
Sample
9aabf0159f605df4b1b9c7baeb22ffdd63d63ef193d25809b10befaf8d04e491.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9aabf0159f605df4b1b9c7baeb22ffdd63d63ef193d25809b10befaf8d04e491.exe
Resource
win10v2004-20221111-en
General
-
Target
9aabf0159f605df4b1b9c7baeb22ffdd63d63ef193d25809b10befaf8d04e491
-
Size
40KB
-
MD5
922714af65a2a96537d06d4cca534589
-
SHA1
6c1193afae85814bf662e7b7806814a269668bed
-
SHA256
9aabf0159f605df4b1b9c7baeb22ffdd63d63ef193d25809b10befaf8d04e491
-
SHA512
9b9e54acf883520b1a9cb6a48e0419f401caebb0b58f52066943ff631444843868e0a12ef938784a76d8cdefb4c814a6a482aa2324609f6d15788bb9189a13bc
-
SSDEEP
768:DRvp4tjDJMGGU4ZDg084RkWwgWLUZQvoBSIKPxBJ:z4t/7GUS334U6gg
Malware Config
Signatures
Files
-
9aabf0159f605df4b1b9c7baeb22ffdd63d63ef193d25809b10befaf8d04e491.exe windows x86
f5b9a89c1c766f02735d90563be8e8ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
lstrcpyA
GetLogicalDriveStringsA
GetCommandLineA
IsBadCodePtr
GetConsoleTitleA
QueryPerformanceFrequency
GetSystemDirectoryA
GetWindowsDirectoryA
GetCurrentDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetSystemTimeAdjustment
AreFileApisANSI
GetProcAddress
VirtualAlloc
VirtualProtect
GetProcessHeap
GetCurrentProcessId
GetEnvironmentStrings
LoadLibraryA
GetModuleHandleA
GetCurrentThread
GetLastError
IsBadReadPtr
IsBadWritePtr
IsBadStringPtrA
GetLogicalDrives
GetComputerNameA
GetConsoleCP
GetConsoleOutputCP
GetCurrentThreadId
QueryPerformanceCounter
GetDiskFreeSpaceExA
GetVolumeInformationA
GetVersion
GetStartupInfoA
ExitThread
user32
GetSysColor
GetKBCodePage
GetForegroundWindow
IsWindow
GetFocus
GetDesktopWindow
GetKeyboardType
GetCapture
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE