Static task
static1
Behavioral task
behavioral1
Sample
b9d21f41e5c22df96d237cf02c49bd01ffc8209313ce69dd301b3cdc9da8b953.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b9d21f41e5c22df96d237cf02c49bd01ffc8209313ce69dd301b3cdc9da8b953.exe
Resource
win10v2004-20220812-en
General
-
Target
b9d21f41e5c22df96d237cf02c49bd01ffc8209313ce69dd301b3cdc9da8b953
-
Size
262KB
-
MD5
25c3386edfee20c02f2b5fbaf0f6e290
-
SHA1
280e8b84508dc0710ad9477c7f752c738600c484
-
SHA256
b9d21f41e5c22df96d237cf02c49bd01ffc8209313ce69dd301b3cdc9da8b953
-
SHA512
3e845cd1946ca83d1b12a196af432c82dccaf1e83ee92b431feb70a7f2954598fe37c2b03cc0c50f0293f3f2368675b33842684938180231b98ece21680a389d
-
SSDEEP
768:mhQ5Lbcp+MGOpbN5XdiAo1EXgBh04uXtle+WPi0CSlHhhItUYQzTGfL:UiLbcmUikXgPWD2BhoQk
Malware Config
Signatures
Files
-
b9d21f41e5c22df96d237cf02c49bd01ffc8209313ce69dd301b3cdc9da8b953.exe windows x86
a20080454e423f72f6ad5e8cced295c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
GetDriveTypeA
CreateDirectoryA
SetFileAttributesA
GetWindowsDirectoryA
GetVolumeInformationA
GetLocaleInfoA
CreateToolhelp32Snapshot
GetCurrentProcessId
Process32First
CloseHandle
Process32Next
GetModuleFileNameA
GetEnvironmentVariableA
Sleep
CreateFileA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLocalTime
DeleteFileA
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
GetStartupInfoA
VirtualAlloc
VirtualQuery
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
HeapValidate
GetLastError
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
GetFileType
GetStdHandle
GetCurrentProcess
DuplicateHandle
SetHandleCount
GetCommandLineA
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetFilePointer
ReadFile
GetConsoleMode
GetConsoleCP
GetConsoleOutputCP
WriteFile
SetStdHandle
SetConsoleCtrlHandler
MultiByteToWideChar
WideCharToMultiByte
SetEndOfFile
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 216KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
heogkse Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fijlfgo Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rqovweb Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
thelipl Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
czripkh Size: - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zklzpaa Size: - Virtual size: 80KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE