Static task
static1
Behavioral task
behavioral1
Sample
841cf626b2dafcde917eb5299981d7bd79819398daa83f98ce32b167fcedd9e4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
841cf626b2dafcde917eb5299981d7bd79819398daa83f98ce32b167fcedd9e4.exe
Resource
win10v2004-20221111-en
General
-
Target
841cf626b2dafcde917eb5299981d7bd79819398daa83f98ce32b167fcedd9e4
-
Size
60KB
-
MD5
c9c13a996af9858967fddc4774efea14
-
SHA1
28bcfb82b995936c1d589cdaea6bfaa32bfd5e19
-
SHA256
841cf626b2dafcde917eb5299981d7bd79819398daa83f98ce32b167fcedd9e4
-
SHA512
66971888c1e016bac16fb82fb63d668c10d5b56ac6257eb8c8d6f888303b76333983a1c433434463037135ed7a317171b84c92df6dfe4ad059912917c91f9516
-
SSDEEP
768:t1iTz/ija+1I0B22W9d7b8znvIAEEzdvoo3eTj7hBrWoZFO70rFlmP0fW1IUugLo:t1iY/W9R8z5tuTxBiyO70rPg0fgLahT
Malware Config
Signatures
Files
-
841cf626b2dafcde917eb5299981d7bd79819398daa83f98ce32b167fcedd9e4.exe windows x86
4a10379fdffb10b3af2c698d4eedb80a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
GetUserNameW
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
user32
GetKeyboardType
MessageBoxA
CreateWindowExW
SetTimer
SendMessageW
RegisterClassExW
PostQuitMessage
LoadIconW
LoadCursorW
GetMessageW
DispatchMessageW
DefWindowProcW
CharLowerBuffW
CharLowerW
CharToOemA
kernel32
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetStartupInfoA
GetLastError
GetCommandLineW
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileW
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
lstrlenW
WriteFile
WinExec
WaitForSingleObject
Sleep
SetFilePointer
SetCurrentDirectoryW
ReleaseMutex
ReadFile
QueryPerformanceCounter
OpenEventW
GetVersionExW
GetProcAddress
GetModuleHandleW
GetLocalTime
GetLastError
GetCurrentDirectoryW
FreeLibrary
FindClose
ExpandEnvironmentStringsW
DeleteFileW
CreateMutexA
CreateFileW
CreateEventW
CopyFileW
CompareFileTime
CloseHandle
LoadLibraryA
GetModuleFileNameA
GetFileAttributesA
GetCommandLineA
FindResourceA
FindNextFileA
FindFirstFileA
shell32
Shell_NotifyIconW
ShellExecuteW
FindExecutableW
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ