Static task
static1
Behavioral task
behavioral1
Sample
b9d4a55e7250900f56b9a8ff58ac051e3393abdbb86fb8881bba101bf60ad193.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9d4a55e7250900f56b9a8ff58ac051e3393abdbb86fb8881bba101bf60ad193.exe
Resource
win10v2004-20220901-en
General
-
Target
b9d4a55e7250900f56b9a8ff58ac051e3393abdbb86fb8881bba101bf60ad193
-
Size
180KB
-
MD5
193b449f8cc933d8bc109c08ec00fc60
-
SHA1
d68e76d4553b10335d94deb7f370cf5b1c40423f
-
SHA256
b9d4a55e7250900f56b9a8ff58ac051e3393abdbb86fb8881bba101bf60ad193
-
SHA512
4f8baef1e0c3b908931f48057747ec423d69dbb683ad8e20285b632c0a5b98703548112f36a5fc2cfebffa5a3575921f2ce1170f301b110e1327cac2f954e1da
-
SSDEEP
1536:TkEquTtNBD6/fQvYz1hzGn3cwT0qaRw4+VV3cNptJHwdv3XS5p5lQ9EsbtVC5QTK:gPuTt0YvYzTGZa6VV3EaKlaXvC5QTPC
Malware Config
Signatures
Files
-
b9d4a55e7250900f56b9a8ff58ac051e3393abdbb86fb8881bba101bf60ad193.exe windows x86
15d48149e22716fb0a5851a1d73968a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
TerminateProcess
WaitForSingleObject
CreateProcessA
SetFileTime
GetVersionExA
GetStartupInfoA
GetModuleHandleA
Sleep
GetLastError
WinExec
CreateFileA
WriteFile
OpenProcess
GetCurrentProcess
DuplicateHandle
CloseHandle
GetSystemDirectoryA
GetFileAttributesExA
user32
CreateWindowExA
DispatchMessageA
GetDesktopWindow
ShowWindow
GetMessageA
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
PostQuitMessage
DefWindowProcA
TranslateMessage
RegisterClassExA
advapi32
CreateServiceA
StartServiceA
OpenServiceA
DeleteService
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
OpenSCManagerA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
__CxxFrameHandler
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
fopen
fwrite
fflush
fclose
_strlwr
sprintf
rand
??3@YAXPAX@Z
??2@YAPAXI@Z
srand
time
_access
wcslen
atoi
strchr
strstr
shlwapi
SHSetValueA
SHGetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ