Static task
static1
Behavioral task
behavioral1
Sample
4c5349fce32c77e9ae731a7b745b7006aec55d0bf56e6dd3f7621dec0d387428.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4c5349fce32c77e9ae731a7b745b7006aec55d0bf56e6dd3f7621dec0d387428.exe
Resource
win10-en-20211208
General
-
Target
4c5349fce32c77e9ae731a7b745b7006aec55d0bf56e6dd3f7621dec0d387428
-
Size
234KB
-
MD5
cc5f35947be6d112c2f8625b30fecb2a
-
SHA1
98cc827e5347513a7a1f5f65ff9217c28ce1bccb
-
SHA256
4c5349fce32c77e9ae731a7b745b7006aec55d0bf56e6dd3f7621dec0d387428
-
SHA512
6ed0966d9c86f73751965b6a198fc59ecdbf218ee231d40b9c9e7f5b73d0db1d72091bfafcf896bc034042e801303ecca8aad7689274f2802f611ca6eaff5992
-
SSDEEP
6144:0cxvjeILZG/lIbKkDYovDCqc1XIrAJgAuOw:0yeIs/leko2LFuP
Malware Config
Signatures
Files
-
4c5349fce32c77e9ae731a7b745b7006aec55d0bf56e6dd3f7621dec0d387428.exe windows x86
ea054ecfb7deec39e587cfb7390ffbb0
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
CreateFileW
CompareStringOrdinal
IsWow64Process
SetFileAttributesW
GetFileAttributesW
DeleteFileW
GetCurrentProcess
Sleep
FindFirstFileW
CloseHandle
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
EncodePointer
OutputDebugStringW
IsDebuggerPresent
GetDiskFreeSpaceExW
GetFileInformationByHandle
SetLastError
GetVolumeInformationByHandleW
GetCurrentDirectoryW
DecodePointer
GetVolumePathNameW
SetFileInformationByHandle
SetFilePointerEx
SetFileTime
GetSystemDirectoryW
MoveFileExW
ReplaceFileW
VerifyVersionInfoW
VerSetConditionMask
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
RaiseException
GetFileInformationByHandleEx
LoadLibraryA
GetProcAddress
SetUnhandledExceptionFilter
GetFileType
GetModuleHandleA
GetFileSize
GetFileAttributesA
CompareStringA
FindFirstFileA
FindNextFileA
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
SetFilePointer
CreateThread
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemFree
PropVariantClear
CoTaskMemAlloc
CoTreatAsClass
advapi32
RegEnumKeyExW
RegGetValueW
RegDeleteTreeW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegDeleteKeyExW
RegCreateKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
InitializeAcl
SetNamedSecurityInfoW
RegOverridePredefKey
GetLengthSid
shell32
SHChangeNotify
SHGetDataFromIDListW
SHBindToParent
SHParseDisplayName
ord709
SHFileOperationW
SHGetKnownFolderPath
ord526
shlwapi
PathIsDirectoryW
PathIsPrefixW
ntdll
NtQueryDirectoryFile
RtlNtStatusToDosError
gdi32
PolylineTo
SetArcDirection
SelectObject
SetDIBits
CreateBrushIndirect
oleaut32
SafeArrayAllocDescriptor
user32
DestroyMenu
CallNextHookEx
GetMenuItemID
GetMenuItemCount
UnhookWindowsHookEx
Sections
.text Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ