Static task
static1
Behavioral task
behavioral1
Sample
a9fc13e5fbb08d81b787b56f63986edb3a2b2f35e534906b0432140284c0700a.exe
Resource
win7-20221111-en
General
-
Target
a9fc13e5fbb08d81b787b56f63986edb3a2b2f35e534906b0432140284c0700a
-
Size
167KB
-
MD5
3e810f59dac57f9f6156ca55391e6ca2
-
SHA1
cbecee7be6be674d82f7e29559ab54413b7ac072
-
SHA256
a9fc13e5fbb08d81b787b56f63986edb3a2b2f35e534906b0432140284c0700a
-
SHA512
fe5af374b76c947d9d49c959f766b6d2411c22cb2e21ed7b0f64204e74c38df1cb1d4695d3466e45eefa349b31dc691d7845ed23400840a524a4a6aaebb17bdc
-
SSDEEP
3072:06amIDcVBd38nhdfmCsohtTc+T4CBD3kSj7cPZetJlhN/vU8FqSRDIl3VQr:hFBd38/DsohtTxBLrHcPE0hS1uQr
Malware Config
Signatures
Files
-
a9fc13e5fbb08d81b787b56f63986edb3a2b2f35e534906b0432140284c0700a.exe windows x86
2dc6402ba70c8d4ab40fa57054d7f758
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcatA
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
SearchPathA
ResumeThread
WriteProcessMemory
HeapValidate
GetCurrentThreadId
QueryPerformanceCounter
QueryPerformanceFrequency
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 26KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 48KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 10KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE