Static task
static1
Behavioral task
behavioral1
Sample
20cf4ba4d117c2bf13b13f6cc99c5b9bee1a9659832976061c4a9b0d73dbe5d9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
20cf4ba4d117c2bf13b13f6cc99c5b9bee1a9659832976061c4a9b0d73dbe5d9.exe
Resource
win10v2004-20220812-en
General
-
Target
20cf4ba4d117c2bf13b13f6cc99c5b9bee1a9659832976061c4a9b0d73dbe5d9
-
Size
224KB
-
MD5
58f96ab43afa93db118a5cb798c40167
-
SHA1
5c991d0bec135ac666c32a51fc8bb8c6f374cc0c
-
SHA256
20cf4ba4d117c2bf13b13f6cc99c5b9bee1a9659832976061c4a9b0d73dbe5d9
-
SHA512
c2df5a08bd777cec0387f53794b35e611b948b347879013ca9642e3b1d0dce03fdb234b9001b5b891f1edb9f487602f2e537f745870dc8e401c680361bbce487
-
SSDEEP
3072:AJB8h3du4iKSeUd4otLxDMcE/iqcmEOmhh42oGaANFaVilto3MJ9mZLQ8htcDcd1:13dyMcqibmE3zyGaxUtoBNcDcdb9IC
Malware Config
Signatures
Files
-
20cf4ba4d117c2bf13b13f6cc99c5b9bee1a9659832976061c4a9b0d73dbe5d9.exe windows x86
8251b0d78305a7d1d4878fed3e40ad52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GlobalLock
GetSystemTimeAsFileTime
LeaveCriticalSection
FreeLibrary
CloseHandle
GlobalHandle
TlsFree
SuspendThread
GetHandleInformation
ReadFile
ReleaseMutex
ResetEvent
GetConsoleCP
WriteFile
GetPrivateProfileStringA
GetPrivateProfileStructA
FindResourceA
GetOEMCP
GetFileType
SetFileAttributesA
GetFileAttributesA
TlsGetValue
GetCurrentThread
SearchPathA
SetFilePointer
GetPrivateProfileSectionNamesA
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
WideCharToMultiByte
GetVersionExA
FindFirstFileA
EnumSystemLocalesA
GetFileTime
GetProcessHeap
GetDateFormatA
lstrcmpA
GetConsoleMode
GetTempFileNameA
HeapAlloc
GetTempPathA
GetStartupInfoA
CreateDirectoryA
SetPriorityClass
GetVersion
IsBadCodePtr
GetEnvironmentVariableA
LoadLibraryA
GetFullPathNameA
CreateProcessA
ReadProcessMemory
DeleteCriticalSection
OpenProcess
EnterCriticalSection
ExitProcess
GetCPInfo
GetCurrentDirectoryA
IsBadReadPtr
GetProcAddress
OutputDebugStringA
Sleep
UnhandledExceptionFilter
VirtualFree
GetLocalTime
SetThreadPriority
IsBadWritePtr
GetLocaleInfoA
lstrcatA
CreateFileMappingA
InterlockedExchange
SystemTimeToFileTime
GetUserDefaultLCID
GetWindowsDirectoryA
GlobalUnlock
MoveFileA
GetShortPathNameA
DisableThreadLibraryCalls
GetStdHandle
GetExitCodeProcess
RemoveDirectoryA
CreateEventA
LoadResource
GetCurrentThreadId
ResumeThread
GetDriveTypeA
InterlockedDecrement
GetSystemDirectoryA
MulDiv
InitializeCriticalSection
HeapCreate
GetThreadTimes
lstrcmpiA
CreateFileA
VirtualAlloc
GetFileSize
RaiseException
ExpandEnvironmentStringsA
TlsAlloc
VirtualQuery
CopyFileA
lstrcpyA
LocalFree
lstrlenA
GetCurrentProcessId
GetCommandLineA
FreeEnvironmentStringsA
SetEvent
FileTimeToLocalFileTime
GetModuleHandleA
CreateThread
CompareStringA
SizeofResource
FormatMessageA
MapViewOfFile
HeapReAlloc
GetEnvironmentStrings
GlobalReAlloc
WaitForSingleObject
MoveFileExA
HeapSize
GetLastError
LCMapStringA
SetLastError
SetErrorMode
SetUnhandledExceptionFilter
MultiByteToWideChar
LockResource
WriteConsoleA
GlobalFree
SetHandleCount
OpenEventA
UnmapViewOfFile
GetCurrentProcess
HeapDestroy
ExitThread
GetPrivateProfileSectionA
FindNextFileA
LoadLibraryExA
GetConsoleOutputCP
SetFileTime
DeviceIoControl
DeleteFileA
VirtualProtect
GetTickCount
HeapFree
CreateToolhelp32Snapshot
Module32Next
SetEndOfFile
msvcrt
memcpy
realloc
fopen
sprintf
atoi
fflush
fclose
memmove
fread
printf
memset
malloc
exit
fseek
free
_errno
strlen
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__dllonexit
_onexit
_unlink
user32
GetDC
GetDesktopWindow
GetWindowRect
SendMessageA
GetCursor
DispatchMessageA
EndDialog
GetForegroundWindow
SetWindowTextA
GetMessageTime
GetFocus
SetWindowLongA
PostQuitMessage
LoadCursorA
GetSystemMetrics
MessageBoxA
FindWindowA
LoadIconA
GetMessagePos
GetActiveWindow
wsprintfA
GetCapture
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE