Static task
static1
Behavioral task
behavioral1
Sample
9c19c5c77cb7029457c1c3f091191822b2fb22cdb92a8e5915b5bb7b9cb2aaa3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c19c5c77cb7029457c1c3f091191822b2fb22cdb92a8e5915b5bb7b9cb2aaa3.exe
Resource
win10v2004-20220812-en
General
-
Target
9c19c5c77cb7029457c1c3f091191822b2fb22cdb92a8e5915b5bb7b9cb2aaa3
-
Size
211KB
-
MD5
9197a1769fc3af6c15c69533ab4c406d
-
SHA1
668ae18a78997af2973e23e7cfa8dd3fc26d946d
-
SHA256
9c19c5c77cb7029457c1c3f091191822b2fb22cdb92a8e5915b5bb7b9cb2aaa3
-
SHA512
645f2bc614bf6206a5214806bac54270d00043c8e99da4f5f117cfeedcc08ddc04f9957cf4bb65f9c4fbeb57c901b5b8b42c75cff4982b7d0900ae2dd1bdad01
-
SSDEEP
6144:uc6Lt+O1F7wkfcm1STfAkGmJgOMcjMJHA:Yt+uF7wkfITscjA
Malware Config
Signatures
Files
-
9c19c5c77cb7029457c1c3f091191822b2fb22cdb92a8e5915b5bb7b9cb2aaa3.exe windows x86
6e2a3c45fd263e1f4161cb2d14547141
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
gdi32
SetTextColor
GetStockObject
CreateCompatibleDC
GetDeviceCaps
DeleteObject
SetBkColor
BitBlt
SelectObject
DeleteDC
advapi32
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExW
user32
DestroyMenu
PostQuitMessage
LoadBitmapA
SetWindowPos
DispatchMessageA
EndPaint
GetDC
GetCursorPos
UnregisterClassA
SendMessageA
DestroyWindow
GetMessageA
GetParent
ShowWindow
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
EnableMenuItem
CreateWindowExA
FillRect
SetFocus
GetSystemMetrics
GetWindowRect
ReleaseCapture
SetWindowLongA
EndDialog
SetWindowTextA
GetDlgItem
LoadCursorA
GetDesktopWindow
ReleaseDC
GetFocus
SetDlgItemTextA
MessageBoxA
GetSysColor
GetClientRect
CallWindowProcA
SetCursor
kernel32
GetConsoleOutputCP
GetStdHandle
GetSystemInfo
ReleaseMutex
WaitForSingleObject
GetDriveTypeA
FindFirstFileW
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
GetCPInfo
LoadLibraryW
WriteFile
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
FreeLibrary
LocalFree
FormatMessageW
GetEnvironmentVariableA
LoadResource
FindClose
InterlockedDecrement
SetLastError
TlsGetValue
lstrlenW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetVersionExA
GetModuleFileNameA
UnhandledExceptionFilter
MultiByteToWideChar
GetLocalTime
lstrlenA
VirtualAlloc
GetCommandLineA
GetOEMCP
Sleep
VirtualFree
HeapCreate
CreateProcessA
GetEnvironmentStrings
InterlockedExchange
GetModuleHandleW
GetACP
CloseHandle
FindFirstFileA
ReadFile
GetModuleHandleA
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetCurrentProcessId
SizeofResource
FileTimeToLocalFileTime
CreateProcessW
RemoveDirectoryA
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
FindResourceW
LoadLibraryExW
InitializeCriticalSection
GetLastError
InterlockedIncrement
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
CreateEventW
GlobalLock
FindNextFileA
CompareStringA
FindNextFileW
CompareStringW
GetProcessHeap
GetProcAddress
DeleteFileW
DeleteFileA
CreateDirectoryA
LCMapStringW
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
GetTickCount
QueryPerformanceCounter
SetEvent
GetVersionExW
lstrcmpiA
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
GetCurrentThreadId
GetLocaleInfoA
SetEndOfFile
GetConsoleMode
VirtualQuery
GetVersion
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
MulDiv
SetUnhandledExceptionFilter
CreateThread
SetFilePointer
Sections
gceukem Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ