Static task
static1
Behavioral task
behavioral1
Sample
9da39192fc0f9f260455b1f7397199524d67171c0705348ec8c3be7fb899ad00.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9da39192fc0f9f260455b1f7397199524d67171c0705348ec8c3be7fb899ad00.exe
Resource
win10v2004-20230221-en
General
-
Target
9da39192fc0f9f260455b1f7397199524d67171c0705348ec8c3be7fb899ad00
-
Size
1.7MB
-
MD5
d9ee79208b09f4c3c989118a370ee6e9
-
SHA1
bfa7c10259e9a26aca2640ee6f31446349d1fc31
-
SHA256
9da39192fc0f9f260455b1f7397199524d67171c0705348ec8c3be7fb899ad00
-
SHA512
3ee8172bab61cc5ae1e7386e44af9f527ec2eb1e217f872f48d205dbe5a7163973af75e56df0007152bb9c94d56923ca8653324aa7b7e513ca1916ff4a44e440
-
SSDEEP
24576:PqbWKEBDlCto8TwyQzJ6TpWnmwZ0yGrMBuH/rjO89xFuc6SJwTHZEaCCbVTawaC7:SCKE0EJ6TkmxAAPzocvE5Ewn
Malware Config
Signatures
Files
-
9da39192fc0f9f260455b1f7397199524d67171c0705348ec8c3be7fb899ad00.exe windows x86
dc896fd4b54fe940f67cf678f35bf805
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
SetLastError
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
CreateEventW
CreateDirectoryW
FindClose
FindNextFileW
FindFirstFileW
GetWindowsDirectoryA
WriteFile
ReadFile
ConnectNamedPipe
CreateNamedPipeW
WritePrivateProfileStringW
CopyFileW
CreateFileW
SetFileAttributesW
CreateThread
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
FlushInstructionCache
GetFullPathNameA
VirtualQuery
LoadLibraryW
lstrlenA
DebugBreak
IsBadReadPtr
HeapValidate
GetFullPathNameW
SetCurrentDirectoryA
GetCurrentDirectoryA
PeekNamedPipe
GetFileInformationByHandle
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetCurrentDirectoryW
SetEnvironmentVariableW
GetVersionExW
FormatMessageW
LocalFree
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetTempFileNameW
MoveFileW
GetCurrentDirectoryW
SetVolumeLabelW
GetModuleHandleW
GetProcAddress
GetCurrentProcess
GetDiskFreeSpaceExW
OutputDebugStringA
Sleep
DeleteFileW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetDriveTypeW
GetDiskFreeSpaceW
GetFileSize
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetTimeZoneInformation
CreateFileA
WriteConsoleW
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
LeaveCriticalSection
EnterCriticalSection
RaiseException
WideCharToMultiByte
GetPrivateProfileIntW
GetPrivateProfileStringW
GetModuleFileNameW
OutputDebugStringW
GetTempPathW
GetDriveTypeA
InterlockedExchange
GetStartupInfoW
RtlUnwind
GetFileAttributesW
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RemoveDirectoryW
MoveFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
HeapReAlloc
HeapSize
GetModuleHandleA
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
user32
OemToCharBuffA
wsprintfW
SetWindowLongW
SendMessageW
ShowWindow
SetDlgItemTextW
MessageBoxW
UnregisterClassA
GetClassLongW
SetClassLongW
DefWindowProcW
GetActiveWindow
DialogBoxParamW
LoadBitmapW
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
EndPaint
BeginPaint
GetWindowLongW
DestroyWindow
CharNextW
EndDialog
CharToOemBuffA
advapi32
GetTokenInformation
OpenProcessToken
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
comctl32
InitCommonControlsEx
gdi32
SetBkColor
SetTextColor
SetBkMode
DeleteObject
DeleteDC
BitBlt
SelectObject
GetObjectW
CreateCompatibleDC
CreateSolidBrush
Sections
.text Size: 467KB - Virtual size: 467KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ