Behavioral task
behavioral1
Sample
c5cf8259812fa98f5879d176fb6cc0079481290fe3cd6a389925847e54336e76.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c5cf8259812fa98f5879d176fb6cc0079481290fe3cd6a389925847e54336e76.exe
Resource
win10v2004-20220414-en
General
-
Target
c5cf8259812fa98f5879d176fb6cc0079481290fe3cd6a389925847e54336e76
-
Size
559KB
-
MD5
8664a770ca28eb9803452cd87b53eb3c
-
SHA1
884e729e7b1c1a07c2a1c0403be483f5a4cd957e
-
SHA256
c5cf8259812fa98f5879d176fb6cc0079481290fe3cd6a389925847e54336e76
-
SHA512
32741a6abccebb750d2326116fd02d33f28cfa7d7a7435a3ba56908bb4365214f8d53196607109da6eb0bef7fd497e5aaba951f4c917ceacd195bd2b8a77f61e
-
SSDEEP
12288:rjIKwVdo0M08eivbgg/57ot47AJwgvGdmUCIemlX3/p:rvkdpTQblUtqidvetCIemlB
Malware Config
Extracted
vidar
7.7
93
http://search.ac.ug/
-
profile_id
93
Signatures
Files
-
c5cf8259812fa98f5879d176fb6cc0079481290fe3cd6a389925847e54336e76.exe windows x86
2817697a76a7495068ceeb0617ca9df5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
GetLastError
CreateMutexA
CloseHandle
WriteFile
CreateFileA
MultiByteToWideChar
ReadFile
GetFileSize
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
GetProcAddress
LoadLibraryA
FreeLibrary
GetPrivateProfileSectionNamesA
GetFileAttributesW
InitializeCriticalSection
InterlockedCompareExchange
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
AreFileApisANSI
SetFilePointer
SetEndOfFile
FlushFileBuffers
UnlockFile
LockFile
LockFileEx
UnlockFileEx
GetFileAttributesA
GetFileAttributesExW
LoadLibraryW
QueryPerformanceCounter
GetTickCount
GetSystemTime
GetSystemTimeAsFileTime
UnmapViewOfFile
GetTempPathA
GetTempPathW
SetCurrentDirectoryA
FormatMessageW
GetFullPathNameA
GetFullPathNameW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
CreateFileW
GetSystemInfo
MapViewOfFile
CreateFileMappingA
GetComputerNameA
IsWow64Process
GetCurrentProcess
GetUserDefaultLocaleName
TzSpecificLocalTimeToSystemTime
GetTimeZoneInformation
GetLocaleInfoA
GetFileSizeEx
FileTimeToSystemTime
GetFileInformationByHandle
SystemTimeToFileTime
GetLocalTime
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetLocaleInfoW
GetStringTypeW
GetModuleFileNameA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetCurrentProcessId
DeleteFileA
Sleep
GetLogicalDriveStringsA
GetDriveTypeA
CreateDirectoryW
lstrlenA
CopyFileW
lstrcpyW
lstrcatW
FindFirstFileW
lstrcmpW
DeleteFileW
FindNextFileW
FindClose
ExitProcess
HeapFree
GetProcessHeap
HeapAlloc
WideCharToMultiByte
SetEnvironmentVariableW
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetOEMCP
GetACP
LocalFree
LocalAlloc
FormatMessageA
HeapCreate
InitializeCriticalSectionAndSpinCount
SetHandleCount
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentThreadId
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
GetModuleFileNameW
GetStdHandle
GetFileType
WriteConsoleW
RtlUnwind
RaiseException
DecodePointer
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
CompareStringW
user32
GetDesktopWindow
GetSystemMetrics
GetDC
CharToOemA
MessageBoxA
GetKeyboardLayoutList
wsprintfA
ReleaseDC
gdi32
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
CreateDCA
GetDeviceCaps
CreateCompatibleDC
advapi32
RegGetValueW
RegOpenKeyExA
RegQueryValueExA
GetUserNameA
GetCurrentHwProfileA
RegOpenKeyExW
RegEnumValueA
RegCloseKey
RegGetValueA
RegEnumKeyExA
shell32
ShellExecuteA
SHGetFolderPathA
ole32
CoCreateInstance
CoUninitialize
shlwapi
PathMatchSpecW
crypt32
CryptStringToBinaryA
CryptUnprotectData
psapi
GetModuleFileNameExA
GetModuleBaseNameA
EnumProcessModules
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
HttpAddRequestHeadersA
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
HttpQueryInfoA
InternetReadFile
InternetSetFilePointer
HttpSendRequestA
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageEncodersSize
GdipCreateBitmapFromHBITMAP
GdipCloneImage
GdipSaveImageToFile
GdipFree
GdipAlloc
GdipGetImageEncoders
GdipDisposeImage
Sections
.text Size: 465KB - Virtual size: 465KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE