Static task
static1
Behavioral task
behavioral1
Sample
4c688c9d80f59387054419507e35d1767b97b5c90ac86294762f1a48ae60a1fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c688c9d80f59387054419507e35d1767b97b5c90ac86294762f1a48ae60a1fe.exe
Resource
win10v2004-20220812-en
General
-
Target
4c688c9d80f59387054419507e35d1767b97b5c90ac86294762f1a48ae60a1fe
-
Size
145KB
-
MD5
e8785bcd3c985f10b31c0d69de52c942
-
SHA1
7ff06bcaae4683819d5489bd7e97eadd1ad8690e
-
SHA256
4c688c9d80f59387054419507e35d1767b97b5c90ac86294762f1a48ae60a1fe
-
SHA512
df165139784d4b17514aad84fc0abbee74fb7ce073f3e6b5c881440fa312a0b2f31bb6c8505fb44b1903826f27fa5983f3a85d4f63ebfb30613050a7d03edc7b
-
SSDEEP
3072:aifBfysUAxqK//yxxrps+rKSBTc/hNpAXVE83QEzRLyJS4wT2WPd1iG4x:HqRL9VeSTmLpVYzRL+CPziGK
Malware Config
Signatures
Files
-
4c688c9d80f59387054419507e35d1767b97b5c90ac86294762f1a48ae60a1fe.exe windows x86
e390390cb5981485be0868db96ee2d3f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
__getmainargs
_open
_adjust_fdiv
_XcptFilter
_acmdln
__setusermatherr
__set_app_type
fgets
_chmod
log10
wcscspn
_read
_ftol
_initterm
_mktemp
_wtoi
__p__fmode
memset
_except_handler3
__p__commode
_controlfp
exit
kernel32
VirtualProtect
GetSystemTime
FileTimeToDosDateTime
GetTimeZoneInformation
LocalFree
GetStartupInfoA
lstrcpynA
GlobalAlloc
GetStringTypeA
FileTimeToLocalFileTime
lstrlenA
GetModuleHandleA
GetACP
comctl32
PropertySheetW
ImageList_SetBkColor
ImageList_Remove
ImageList_BeginDrag
CreatePropertySheetPageW
ImageList_DragLeave
ImageList_ReplaceIcon
ImageList_LoadImageA
PropertySheetA
InitializeFlatSB
ole32
DoDragDrop
CreateStreamOnHGlobal
CLSIDFromProgID
CoRevokeClassObject
OleIsCurrentClipboard
OleSetClipboard
OleInitialize
CoSetProxyBlanket
StgOpenStorage
version
GetFileVersionInfoA
VerQueryValueW
VerQueryValueA
GetFileVersionInfoSizeW
VerInstallFileW
shell32
CommandLineToArgvW
SHGetFolderPathW
DragQueryFileA
ExtractIconA
FindExecutableW
SHGetFolderLocation
ExtractIconExA
SHGetSpecialFolderPathW
SHGetSettings
SHFileOperationA
ExtractIconExW
DoEnvironmentSubstW
SHGetDiskFreeSpaceExW
oleaut32
SafeArrayGetUBound
GetActiveObject
LoadTypeLib
SafeArrayGetElement
SafeArrayPutElement
SysAllocStringByteLen
GetErrorInfo
SysReAllocStringLen
CreateErrorInfo
SysFreeString
user32
UnhookWindowsHookEx
wsprintfA
CharLowerA
DestroyIcon
DefWindowProcA
UnregisterClassA
UpdateWindow
GetDC
DispatchMessageA
advapi32
GetUserNameA
GetLengthSid
RegDeleteValueA
InitializeAcl
RegSetValueExW
CheckTokenMembership
DeleteService
RegEnumKeyA
gdi32
ExtCreateRegion
SetWorldTransform
GetBkMode
CreateHatchBrush
CreateCompatibleBitmap
PlayEnhMetaFile
PatBlt
Polygon
SetMapMode
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE