Static task
static1
Behavioral task
behavioral1
Sample
9d85a50aeb5b73b8fad27cba18892a12333579da8e01c09cc9d0cdfcc5543b8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d85a50aeb5b73b8fad27cba18892a12333579da8e01c09cc9d0cdfcc5543b8b.exe
Resource
win10v2004-20221111-en
General
-
Target
9d85a50aeb5b73b8fad27cba18892a12333579da8e01c09cc9d0cdfcc5543b8b
-
Size
680KB
-
MD5
ddc5ea899e7ca0f855a000838a2b45f8
-
SHA1
09181b8824a2029a30bf126475b5a602f39bc2c1
-
SHA256
9d85a50aeb5b73b8fad27cba18892a12333579da8e01c09cc9d0cdfcc5543b8b
-
SHA512
c2550a8d10144af664bf70e76e3aaea99eaf08516e99c4897043d12b4aacf7be7aa0be3eeecc3b4d2757961c9586ff719791102f35333fe0588f1a18c7d9c50e
-
SSDEEP
12288:CzNsvG/6sSBBUqyHpDKv3S+TiKUI2IvyY88:CzNsvG/6ZUDHpDKv3xTPUbIG8
Malware Config
Signatures
Files
-
9d85a50aeb5b73b8fad27cba18892a12333579da8e01c09cc9d0cdfcc5543b8b.exe windows x86
3128951df3a12cbfdb8e4540c6828c00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
EnterCriticalSection
GetTempFileNameW
GetCurrentProcess
GetModuleFileNameW
GetFileAttributesW
MulDiv
LeaveCriticalSection
FlushInstructionCache
RaiseException
GetLastError
FormatMessageW
DeleteFileW
LocalFree
SetLastError
WaitForSingleObject
CloseHandle
FindFirstFileW
WideCharToMultiByte
FindClose
MapViewOfFileEx
LockResource
LoadResource
GetTickCount
GetPrivateProfileIntW
CreateProcessW
GetPrivateProfileStringW
GetExitCodeProcess
ReadFile
GetProcessHeap
FindResourceExW
SizeofResource
GetFileSize
lstrlenW
GetSystemWindowsDirectoryW
OutputDebugStringW
FindResourceW
HeapFree
UnmapViewOfFile
GetSystemWow64DirectoryW
CreateFileW
FindNextFileW
InterlockedDecrement
lstrcpynW
GetVolumeNameForVolumeMountPointW
GetDiskFreeSpaceExW
GetTempPathW
GetVersionExW
ExpandEnvironmentStringsW
InitializeCriticalSection
FreeLibrary
CreateThread
GetModuleHandleW
DuplicateHandle
Sleep
GetCommandLineW
SetEvent
CreateEventW
OpenProcess
GetProcAddress
LoadLibraryW
DeleteCriticalSection
InterlockedIncrement
GetLocalTime
GetCurrentProcessId
GetFileAttributesExW
GetFullPathNameW
CreateDirectoryW
SetFileTime
DeviceIoControl
SetFileAttributesW
SetFilePointerEx
WriteFile
FlushFileBuffers
LocalAlloc
GetVolumeInformationW
ExpandEnvironmentStringsA
LoadLibraryA
InterlockedExchange
GetVersionExA
HeapDestroy
HeapAlloc
HeapReAlloc
HeapSize
InterlockedCompareExchange
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
GetACP
GetLocaleInfoA
GetThreadLocale
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetStartupInfoW
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
ExitProcess
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
GetCPInfo
GetOEMCP
IsValidCodePage
HeapCreate
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetStringTypeA
GetStringTypeW
CreateFileA
SetEndOfFile
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 392KB - Virtual size: 389KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ