Static task
static1
Behavioral task
behavioral1
Sample
9133556b2675fc9a9b0059ddeda54674db10e9ccae8c9dc876a15a7d5bf67df4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9133556b2675fc9a9b0059ddeda54674db10e9ccae8c9dc876a15a7d5bf67df4.exe
Resource
win10v2004-20221111-en
General
-
Target
9133556b2675fc9a9b0059ddeda54674db10e9ccae8c9dc876a15a7d5bf67df4
-
Size
275KB
-
MD5
ca788f30d394815fbc09c2a2fcf08f1b
-
SHA1
379086fccd5b98738e12ba7caafd0b790f984c4b
-
SHA256
9133556b2675fc9a9b0059ddeda54674db10e9ccae8c9dc876a15a7d5bf67df4
-
SHA512
38892270f9b11294668e813221af2b871fa3a3e010a6eccceb5ea33a7e3edb95885dd4a3acaaf0b4e5d258da43b2f3491baea310dc42ed314a24795b5c631ca9
-
SSDEEP
6144:HYjW+wbVQm8bGvQqKmqk+cn7+Ls/6gfIHkcCUKQhRzXVls:HF+wbq/oKxsS3kcCU5hRpls
Malware Config
Signatures
Files
-
9133556b2675fc9a9b0059ddeda54674db10e9ccae8c9dc876a15a7d5bf67df4.exe windows x86
911e10843fcfcbb84dd6af75505e9db1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetUserDefaultLCID
HeapDestroy
LCMapStringW
RtlUnwind
GetModuleFileNameW
GetWindowsDirectoryW
GetCurrentProcess
GetEnvironmentStringsW
VirtualAlloc
InterlockedDecrement
GetVersionExA
HeapReAlloc
GetCommandLineW
GlobalAddAtomW
GetCommandLineA
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
EnumSystemLocalesA
GetLocaleInfoW
WriteFile
FreeLibrary
GetLocaleInfoA
VirtualFree
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetFileType
CompareStringW
GetStringTypeA
QueryPerformanceCounter
SetHandleCount
IsValidLocale
InitializeCriticalSectionAndSpinCount
IsValidCodePage
SetConsoleCtrlHandler
CompareStringA
HeapAlloc
GetDateFormatA
HeapFree
GetExitCodeThread
TlsGetValue
GetCurrentProcessId
GetDriveTypeW
GetOEMCP
UnhandledExceptionFilter
LeaveCriticalSection
GetStdHandle
CreateMailslotA
GetACP
GetProcessHeap
EnterCriticalSection
Sleep
LCMapStringA
SetEndOfFile
CreateMutexA
TlsFree
TlsAlloc
SetUnhandledExceptionFilter
GetTempFileNameW
SetLocaleInfoW
IsDebuggerPresent
WideCharToMultiByte
WaitCommEvent
GetCompressedFileSizeW
GetStartupInfoW
GetProcAddress
GetCPInfo
GetCurrentThread
TlsSetValue
HeapCreate
InterlockedExchange
GetStringTypeW
SetLastError
GetEnvironmentStrings
VirtualQuery
SetEnvironmentVariableA
MultiByteToWideChar
FindFirstFileExA
HeapSize
GetCurrentThreadId
GetTimeFormatA
OpenFileMappingA
TerminateProcess
FreeEnvironmentStringsW
GetTimeZoneInformation
GetAtomNameW
GetModuleHandleA
InterlockedIncrement
GetLastError
GetStartupInfoA
WaitForSingleObject
ExitProcess
shell32
ExtractAssociatedIconA
SheChangeDirExW
DoEnvironmentSubstW
ExtractIconEx
SheChangeDirA
ShellAboutW
FreeIconList
SHQueryRecycleBinA
SHGetMalloc
SHFormatDrive
comdlg32
ChooseFontA
FindTextA
LoadAlterBitmap
ChooseColorA
FindTextW
ChooseFontW
GetFileTitleA
ReplaceTextW
ReplaceTextA
GetSaveFileNameA
GetFileTitleW
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 139KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE