Static task
static1
Behavioral task
behavioral1
Sample
c25c4f7eb3271aee953f36b8cc7f77ece7cf573b968633b7d1cae2dc70371a81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c25c4f7eb3271aee953f36b8cc7f77ece7cf573b968633b7d1cae2dc70371a81.exe
Resource
win10v2004-20220812-en
General
-
Target
c25c4f7eb3271aee953f36b8cc7f77ece7cf573b968633b7d1cae2dc70371a81
-
Size
1.4MB
-
MD5
80928c0406a74f775cb4a129427659b0
-
SHA1
e5a995aebcf7093b54aff45e018448c104f42f40
-
SHA256
c25c4f7eb3271aee953f36b8cc7f77ece7cf573b968633b7d1cae2dc70371a81
-
SHA512
e88df8602be216d4c688dc74301071694b852e6c293d613508657272fb15919b99820fedbf1ddd1950a292c2f5d6362e99c1e73dc2837112cb4f6a2b2c642046
-
SSDEEP
24576:A8PPL7AZRVksPH1Uf4iL7LOUx80d3vtO27iMwUED9K/93vLsw2aQZRcjsV:nOGf4iL7LO/y9/wP2k
Malware Config
Signatures
Files
-
c25c4f7eb3271aee953f36b8cc7f77ece7cf573b968633b7d1cae2dc70371a81.exe windows x86
f31149838623123ff28b20b7e8d38e68
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
CloseServiceHandle
ControlService
InitializeSecurityDescriptor
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
SetEntriesInAclA
SetSecurityDescriptorDacl
SetSecurityInfo
SetServiceObjectSecurity
kernel32
AddAtomA
CloseHandle
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindAtomA
FreeLibrary
GetAtomNameA
GetCommandLineA
GetCurrentProcess
GetEnvironmentVariableA
GetFileAttributesA
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetTempPathA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MoveFileExA
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
ReleaseSemaphore
SetErrorMode
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
msvcrt
_fdopen
_read
_strdup
_strlwr
_write
__getmainargs
__lc_codepage
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_ctype
_errno
_filelengthi64
_fstati64
_iob
_lseeki64
_onexit
_setmode
abort
atexit
atoi
fclose
fflush
fgetpos
fopen
fputc
fread
free
fsetpos
fwrite
getc
getenv
isalnum
localeconv
malloc
memchr
memcpy
memmove
memset
putc
realloc
setlocale
setvbuf
signal
strcmp
strcoll
strcpy
strftime
strlen
strstr
strtod
strtok
strxfrm
time
ungetc
wcslen
user32
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
GetMessageA
KillTimer
LoadCursorA
PostQuitMessage
RegisterClassExA
SetTimer
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
wininet
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
Sections
0 Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 944KB - Virtual size: 944KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
6 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
8 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE