Static task
static1
Behavioral task
behavioral1
Sample
98a9033bc583276abfdef55cda65e96816fd3936a19d5b3be0e4ce892c43f13e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
98a9033bc583276abfdef55cda65e96816fd3936a19d5b3be0e4ce892c43f13e.exe
Resource
win10v2004-20221111-en
General
-
Target
98a9033bc583276abfdef55cda65e96816fd3936a19d5b3be0e4ce892c43f13e
-
Size
72KB
-
MD5
5f07462c70ed0a07423177485c3deb4e
-
SHA1
785482e885e77191588ec193b755dce72319bb03
-
SHA256
98a9033bc583276abfdef55cda65e96816fd3936a19d5b3be0e4ce892c43f13e
-
SHA512
0f14f799219dea99c555750605310d32081013f46acd88424db797ce8cdcc3d7427c0c572676385196bd952cf748e8f394df9a9193c8d1ec0c921952aa6165f0
-
SSDEEP
1536:z4um97H0K3e84DVFZIVaUcCdvB74fiM+7ykrkcPRqTjVBnCSFLqu55L7n6oL6Wt:sts800/3KVhFWGVt
Malware Config
Signatures
Files
-
98a9033bc583276abfdef55cda65e96816fd3936a19d5b3be0e4ce892c43f13e.exe windows x86
30b524cf2eacb2b476cdd3be4f0b5412
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDoubleClickTime
GetSysColorBrush
GetGuiResources
GetMonitorInfoA
GetKeyboardType
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegGetKeySecurity
LookupAccountSidA
GetTokenInformation
ws2_32
WSAStartup
htonl
wininet
InternetReadFile
InternetOpenA
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
netapi32
NetUserGetInfo
NetApiBufferFree
kernel32
FlushFileBuffers
GetLocaleInfoA
VirtualProtect
GetSystemInfo
MultiByteToWideChar
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
VirtualAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
GetTickCount
GetVersion
Sleep
GetCurrentProcess
GetExitCodeProcess
SetErrorMode
GetStdHandle
GetProcessShutdownParameters
CloseHandle
GetVolumeInformationA
GetCompressedFileSizeA
GetFileSize
DeviceIoControl
GetFileAttributesExA
GetFileTime
GetEnvironmentVariableA
GetProcessPriorityBoost
GetProcessAffinityMask
DeleteFileA
CreateFileA
GetPriorityClass
GetDiskFreeSpaceExA
GetFirmwareEnvironmentVariableA
OpenProcess
WriteFile
ExitProcess
CreateMutexA
OpenMutexA
CreateProcessA
GetShortPathNameA
GetModuleFileNameA
SetEnvironmentVariableA
CopyFileA
SetFileAttributesA
GetLastError
CreateDirectoryA
CreateThread
GetLocalTime
GetDriveTypeA
GetLogicalDriveStringsA
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleA
TerminateProcess
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
HeapFree
HeapAlloc
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
SetFilePointer
LoadLibraryA
InterlockedExchange
VirtualQuery
SetUnhandledExceptionFilter
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE