Static task
static1
Behavioral task
behavioral1
Sample
90b027555a8ca33f372be0953eb40875defc4df40117166a990b3d2be588c8e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90b027555a8ca33f372be0953eb40875defc4df40117166a990b3d2be588c8e3.exe
Resource
win10v2004-20221111-en
General
-
Target
90b027555a8ca33f372be0953eb40875defc4df40117166a990b3d2be588c8e3
-
Size
363KB
-
MD5
c9cd5e6156973c3b38affaa157130b37
-
SHA1
964a4b192155bbb7244a0e69531b62aa72d49477
-
SHA256
90b027555a8ca33f372be0953eb40875defc4df40117166a990b3d2be588c8e3
-
SHA512
bc901b67c74d832e7faee2145c3fc75d05ccba7195fb6cc867fcaf979f495c637414298261cff90770149d7c288d90c3a3a0166617afbc8556d5cc7123a147ed
-
SSDEEP
6144:FiJwnMGOr8fe0AJgjchjTnDqNkCYV7zj9nd56t6L8R8NmC:8+n9O8e0Fcx/bV7Pn5k+XNH
Malware Config
Signatures
Files
-
90b027555a8ca33f372be0953eb40875defc4df40117166a990b3d2be588c8e3.exe windows x86
9d6a97a0bb42d1e086ee9b99b7ee6312
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
GetCommandLineA
EnumResourceTypesA
GetTickCount
CloseHandle
CreateMutexA
LoadLibraryExW
FreeConsole
FindClose
VirtualProtect
GetComputerNameA
SetLastError
GetDiskFreeSpaceExW
GetModuleHandleA
GetLastError
ReleaseMutex
GetDriveTypeA
TlsGetValue
DeleteCriticalSection
Sleep
shell32
SHFree
DragFinish
SHGetSettings
DragAcceptFiles
ShellAboutA
DragQueryFileA
ShellMessageBoxA
DuplicateIcon
SHGetDiskFreeSpaceA
SHGetMalloc
DllUnregisterServer
StrChrA
ExtractIconA
printui
bPrinterSetup
bFolderGetPrinter
vQueueCreate
PnPInterface
vPrinterPropPages
user32
MessageBoxA
Sections
.text Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ