Static task
static1
Behavioral task
behavioral1
Sample
9b5eb07708dfcc4b8d22bb396a293a36c123b61c8f83d1b2c335fb1d522af170.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9b5eb07708dfcc4b8d22bb396a293a36c123b61c8f83d1b2c335fb1d522af170.exe
Resource
win10v2004-20221111-en
General
-
Target
9b5eb07708dfcc4b8d22bb396a293a36c123b61c8f83d1b2c335fb1d522af170
-
Size
232KB
-
MD5
3f1b66a5651be4d7ae31ab1b9d2ff665
-
SHA1
82412b97fbccd54c87a4bb50f280a495260d4639
-
SHA256
9b5eb07708dfcc4b8d22bb396a293a36c123b61c8f83d1b2c335fb1d522af170
-
SHA512
49858430367beb9e504f16ea36012a59264747e3588527fc40786b4502cb93140a8c6e9fd3fedb43125a752e807d01a4f8015aba4d5ee47221a7bc33338feb4a
-
SSDEEP
3072:gZY9B6O0MTgp6T/InZjLbDy8dVcrpC44oV8fkoyw5Xdc9aKSygtyVcLD5IpNTvMx:gw6xMsp6TObDwM5UaztyeLDepNLql
Malware Config
Signatures
Files
-
9b5eb07708dfcc4b8d22bb396a293a36c123b61c8f83d1b2c335fb1d522af170.exe windows x86
17a4602664557548c4dbb2560dd2243a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetProcessId
GlobalAlloc
GetEnvironmentVariableA
CompareStringA
Sleep
GetUserDefaultLCID
HeapAlloc
WinExec
HeapDestroy
lstrlenA
GlobalUnlock
FindResourceA
VirtualAlloc
GetFileType
IsValidCodePage
WriteFile
SetConsoleCtrlHandler
InterlockedDecrement
LockResource
SetStdHandle
TlsSetValue
GetTimeZoneInformation
GetCurrentDirectoryA
LeaveCriticalSection
GlobalFree
GetDriveTypeA
GetVersion
GetLocaleInfoW
WideCharToMultiByte
FreeEnvironmentStringsW
GetFileSize
GetVersionExA
GetModuleFileNameA
GetStdHandle
GetEnvironmentStringsW
IsBadWritePtr
GetTempFileNameA
DeleteFileA
GlobalHandle
GlobalLock
GetStringTypeA
FileTimeToSystemTime
ReadFile
FreeEnvironmentStringsA
GetStringTypeW
CompareStringW
LoadLibraryA
LCMapStringA
UnhandledExceptionFilter
VirtualFree
ExitProcess
TerminateThread
DeleteCriticalSection
SizeofResource
IsValidLocale
GetLocaleInfoA
TlsFree
SetCurrentDirectoryA
GetProcAddress
lstrcatA
GetFullPathNameA
GetCurrentThread
GetCurrentThreadId
GetCurrentProcess
GetFileAttributesA
InitializeCriticalSection
lstrcpyA
CreateFileA
CreateProcessA
GetStartupInfoA
RtlUnwind
SetEnvironmentVariableA
FreeLibrary
GetSystemDefaultLangID
LoadResource
SetFilePointer
TlsAlloc
TerminateProcess
EnterCriticalSection
FlushFileBuffers
SetLastError
GetComputerNameA
FindClose
GetEnvironmentStrings
SetEndOfFile
CreateThread
TlsGetValue
GetACP
FileTimeToLocalFileTime
EnumSystemLocalesA
GetLastError
CloseHandle
LCMapStringW
GetOEMCP
HeapFree
FatalAppExitA
MultiByteToWideChar
HeapReAlloc
SetHandleCount
FindFirstFileA
GetCPInfo
GetTempPathA
HeapCreate
InterlockedIncrement
ResumeThread
user32
UnhookWindowsHookEx
SetDlgItemTextA
LoadImageA
GetClientRect
GetDlgItemTextA
RegisterClassExA
SendMessageA
MessageBoxA
EnumWindowStationsA
ShowWindow
EndDialog
UnregisterClassA
SetWindowTextA
GetSystemMetrics
PostQuitMessage
SetWindowsHookExA
SetForegroundWindow
DialogBoxParamA
GetWindowRect
IsIconic
FindWindowA
LoadIconA
PostMessageA
SetWindowPos
DefWindowProcA
EnableWindow
SetClassLongA
GetDlgItem
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ