Static task
static1
Behavioral task
behavioral1
Sample
9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe
Resource
win10v2004-20221111-en
General
-
Target
9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a
-
Size
1.5MB
-
MD5
ed89f4245dbc0d3d6ce217eaf03c7905
-
SHA1
ab19db8237ef88e3fff7f35a98277d618be95005
-
SHA256
9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a
-
SHA512
426e5842df72759a1807fe78f5e2d12d06b70ed7f8cde5f16df1500470db72af076adc92c3abf932eed95a810bac11daaebabff75154de6a772bd01fc5c7eab1
-
SSDEEP
24576:din21YorzjJGRnp110omtDTAuLYiK+sUThY5zuYY0ybi6X27Oj/5VN+X+lzSvCeH:dFYorzjJsnp1107K+Lq5zujjX2G5VkXa
Malware Config
Signatures
Files
-
9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe windows x86
0c6cbbde4f3ccc0aab9ec25359174804
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
GetCurrentThreadId
LoadLibraryA
CreatePipe
CreateProcessA
CloseHandle
PeekNamedPipe
ReadFile
GetExitCodeProcess
GetEnvironmentVariableA
CreateWaitableTimerA
SetWaitableTimer
Sleep
CreateIoCompletionPort
GetQueuedCompletionStatus
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetLocalTime
GetModuleFileNameA
WriteFile
CreateFileA
FreeLibrary
GetProcAddress
LCMapStringA
LocalSize
FlushFileBuffers
SetStdHandle
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
RaiseException
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetLastError
GetModuleHandleW
MultiByteToWideChar
TlsGetValue
SetLastError
GetStartupInfoA
GetCommandLineA
GetVersion
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
TlsSetValue
TlsAlloc
user32
LoadCursorW
CreateWindowExW
GetSysColor
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
WaitForInputIdle
GetClassNameA
GetAncestor
GetParent
DefWindowProcW
EndPaint
FillRect
BeginPaint
GetWindowThreadProcessId
SetFocus
SetForegroundWindow
BringWindowToTop
AttachThreadInput
IsZoomed
IsIconic
ShowWindow
SetWindowLongW
GetWindowLongW
DestroyIcon
CreateIconFromResource
RegisterClassExW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoCreateGuid
gdi32
DeleteObject
CreateSolidBrush
imagehlp
MakeSureDirectoryPathExists
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE