Static task
static1
Behavioral task
behavioral1
Sample
9f2a1a8e08d24bf525ef30ef847db26f2e0d6d93603f352e74931c7806b21c51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f2a1a8e08d24bf525ef30ef847db26f2e0d6d93603f352e74931c7806b21c51.exe
Resource
win10v2004-20220812-en
General
-
Target
9f2a1a8e08d24bf525ef30ef847db26f2e0d6d93603f352e74931c7806b21c51
-
Size
3.2MB
-
MD5
f4ce2ed04cdd8578c2770f5a7949e0cb
-
SHA1
afda65082385527ff12e28498cb0802cd7276a68
-
SHA256
9f2a1a8e08d24bf525ef30ef847db26f2e0d6d93603f352e74931c7806b21c51
-
SHA512
7b96db6909afe99da99ba35b45aadd1bd64af0448e7e5b584bcc0702b517c3d4d37b31a484cd48bf76375728f5cada2c1e2e9cbbc795a331cc91f75dfc813a7d
-
SSDEEP
49152:jodO/Z9usjMlnqFxd9Qg4e6JeV6wxfrTroiA5tDXe8E7A+ZF8+m606n4erbGELTu:NLusj4qFag4neAwSvtD8sWGjYDdLT4cE
Malware Config
Signatures
Files
-
9f2a1a8e08d24bf525ef30ef847db26f2e0d6d93603f352e74931c7806b21c51.exe windows x86
92e6fde7760ad83c3d7bf0410010bf08
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LCMapStringW
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
GetCurrentDirectoryW
DeleteFileA
WaitForSingleObject
GetUserDefaultLCID
GetExitCodeProcess
MultiByteToWideChar
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
HeapAlloc
HeapReAlloc
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetCurrentProcess
TerminateProcess
ExitProcess
RtlUnwind
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetSystemTime
GetOEMCP
GetTickCount
GetLastError
Sleep
GetCurrentDirectoryA
CloseHandle
SetEndOfFile
SetFilePointer
MoveFileA
CompareFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
SystemTimeToFileTime
SetFileAttributesA
GetFileAttributesA
GetLocalTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileTime
WriteFile
GetACP
ReadFile
GetFileSize
LocalFree
FormatMessageA
GetFullPathNameW
GetFullPathNameA
GetTempPathW
GetTempPathA
GetModuleFileNameW
GetModuleFileNameA
MoveFileW
CopyFileW
CopyFileA
DeleteFileW
GetFileAttributesW
CreateDirectoryW
CreateDirectoryA
SetCurrentDirectoryW
SetCurrentDirectoryA
SetFileAttributesW
GetFileTime
GetTimeZoneInformation
CreateFileA
CreateFileW
IsBadReadPtr
GetVersionExA
GetProcAddress
LoadLibraryA
LocalAlloc
FreeLibrary
WideCharToMultiByte
user32
SetWindowPos
OffsetRect
CreateWindowExW
DialogBoxParamW
LoadCursorA
RegisterClassExW
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
GetDlgItem
SendMessageA
LoadStringW
PostMessageA
SetTimer
GetDlgItemTextA
LoadStringA
DefWindowProcA
DestroyWindow
BeginPaint
EndPaint
SetDlgItemTextW
GetDlgItemTextW
SetWindowTextW
MoveWindow
EnableWindow
SetDlgItemTextA
EndDialog
PostQuitMessage
MessageBoxW
GetDesktopWindow
GetWindowRect
CopyRect
shell32
SHBrowseForFolderW
SHGetMalloc
SHGetPathFromIDListW
ShellExecuteExW
crypt32
CertCloseStore
CertNameToStrA
CertFreeCertificateContext
CryptDecodeObject
ws2_32
WSAGetLastError
socket
inet_addr
htons
gethostbyname
connect
WSAStartup
ioctlsocket
select
bind
closesocket
shutdown
send
recv
wininet
InternetCombineUrlA
advapi32
RegCloseKey
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
oleaut32
SysAllocString
SysFreeString
SysStringLen
Sections
.text Size: 444KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ