Static task
static1
Behavioral task
behavioral1
Sample
9b716c5a4df29fcc70c4316ac41c2dc3079c4600fda228f95150a1f2da74669d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b716c5a4df29fcc70c4316ac41c2dc3079c4600fda228f95150a1f2da74669d.exe
Resource
win10v2004-20221111-en
General
-
Target
9b716c5a4df29fcc70c4316ac41c2dc3079c4600fda228f95150a1f2da74669d
-
Size
274KB
-
MD5
60e5b243e729815e096a4b1ee56bb0e6
-
SHA1
7868a36550a3b04e717569ee9e822a69b145a1e1
-
SHA256
9b716c5a4df29fcc70c4316ac41c2dc3079c4600fda228f95150a1f2da74669d
-
SHA512
4114bf0716dd30de082f17ec0926857c3812730c2ab0fa27ae29aef9111625493edbd8ccbd6663e5e18e884ef45d55047d82abd027ca40ac6b33b715f7df6f46
-
SSDEEP
6144:p6eqHRaE63NBpKkJnyXBKdVnJrufumG89LZuZ3t3Y6WQzIn:wHRaE6DQviJWmZ3xYDAu
Malware Config
Signatures
Files
-
9b716c5a4df29fcc70c4316ac41c2dc3079c4600fda228f95150a1f2da74669d.exe windows x86
7b517af7ba44ed1a428a8877fa12c77c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleOutputCP
GlobalGetAtomNameW
GetDateFormatA
UnhandledExceptionFilter
WriteConsoleA
WriteFile
GetTimeFormatA
SetStdHandle
TerminateProcess
GetCurrentProcess
HeapReAlloc
GetLocaleInfoA
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetACP
IsDebuggerPresent
EnterCriticalSection
IsValidCodePage
EnumResourceNamesA
GetCPInfo
HeapSize
GetCPInfoExW
FreeLibrary
VirtualAlloc
SetUnhandledExceptionFilter
LoadLibraryA
GetCurrentProcessId
LeaveCriticalSection
GetOEMCP
MultiByteToWideChar
SetFilePointer
RaiseException
rpcrt4
RpcStringFreeA
shlwapi
SHCreateStreamOnFileA
PathIsContentTypeA
SHCreateStreamOnFileEx
PathIsFileSpecA
PathAppendA
PathCreateFromUrlW
Sections
.text Size: 135KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ