Static task
static1
Behavioral task
behavioral1
Sample
c261f727df72cf45c1080fc77ec5b7a45e28bf9eac4bc0c698ac3b591a8a464b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c261f727df72cf45c1080fc77ec5b7a45e28bf9eac4bc0c698ac3b591a8a464b.exe
Resource
win10v2004-20220812-en
General
-
Target
c261f727df72cf45c1080fc77ec5b7a45e28bf9eac4bc0c698ac3b591a8a464b
-
Size
640KB
-
MD5
4ce914bb708793b9b5d6bfe2c4bc4ca5
-
SHA1
87f4bcf3ee3225bb1ee0deaeb48ac7df963ecec1
-
SHA256
c261f727df72cf45c1080fc77ec5b7a45e28bf9eac4bc0c698ac3b591a8a464b
-
SHA512
b90b235b95cfa4b3d5bd3573b67cdcd6e571dfc22f984c45a15abb4959115c8bc839b15c79729e90ebf995fbd7fae70ec22ee831c7313ba8eed62d1bb3308d08
-
SSDEEP
12288:B+Ei3wNYI9c478Ld/Lkrt1/dVFZriQu/aO2DJRI7e9vt8zaNV4T/c:fJ/dgLd/+jfFNpDJy7e9VsR/c
Malware Config
Signatures
Files
-
c261f727df72cf45c1080fc77ec5b7a45e28bf9eac4bc0c698ac3b591a8a464b.exe windows x86
b567b20e73659b9783fed6b093d1a6eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
FindExecutableA
SHEmptyRecycleBinW
SHGetSpecialFolderPathA
DragQueryFile
SHGetPathFromIDListW
ShellExecuteEx
ShellExecuteExA
SHChangeNotify
InternalExtractIconListA
ShellAboutA
DuplicateIcon
SHLoadInProc
DoEnvironmentSubstA
SHQueryRecycleBinW
SHGetDiskFreeSpaceA
ExtractIconExA
RealShellExecuteExW
SHFileOperationW
wininet
GetUrlCacheEntryInfoExA
gdi32
GetGlyphOutline
CreateEllipticRgn
CopyMetaFileA
GetOutlineTextMetricsW
user32
IsCharLowerW
GetOpenClipboardWindow
RegisterClassA
SetWindowLongW
AnyPopup
UnhookWindowsHook
GetUserObjectSecurity
IsCharUpperW
ScrollWindow
SetDebugErrorLevel
FlashWindowEx
SetMenuItemInfoA
PaintDesktop
SetSysColors
LoadBitmapW
EnumWindowStationsW
IsMenu
ImpersonateDdeClientWindow
WinHelpW
ChangeDisplaySettingsW
CharPrevExA
GetMenuStringA
kernel32
HeapDestroy
WaitForSingleObject
SetEnvironmentVariableA
TlsFree
GetEnvironmentStrings
GetModuleHandleW
RaiseException
OpenWaitableTimerA
InterlockedExchange
GetCurrentThread
GetStdHandle
IsDebuggerPresent
LockFileEx
GetModuleHandleA
EnterCriticalSection
OutputDebugStringW
GetProcessHeap
IsBadReadPtr
WriteConsoleW
EnumSystemLocalesA
GetModuleFileNameW
DebugBreak
CreateFileA
HeapReAlloc
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetVersionExA
FreeEnvironmentStringsA
CompareStringW
HeapFree
GetSystemTimeAsFileTime
SetHandleCount
EnumResourceNamesA
OutputDebugStringA
GetCommandLineA
GetStringTypeW
HeapCreate
GetFileAttributesExA
CreateDirectoryExW
GetTimeZoneInformation
SetStdHandle
GetCPInfo
GetConsoleCP
DeleteFiber
HeapSize
InterlockedDecrement
GetConsoleMode
GetLastError
SetUnhandledExceptionFilter
GetPrivateProfileIntW
WriteConsoleA
InterlockedIncrement
UnhandledExceptionFilter
TlsAlloc
SetLastError
GetTickCount
QueryPerformanceCounter
LCMapStringA
LCMapStringW
TerminateProcess
EnumSystemCodePagesW
IsValidCodePage
TlsGetValue
EnumDateFormatsW
GetCurrentThreadId
GetLocaleInfoA
CloseHandle
GetCurrentProcess
GetLocaleInfoW
RtlUnwind
MultiByteToWideChar
HeapAlloc
TlsSetValue
GetExitCodeThread
FreeEnvironmentStringsW
GetConsoleOutputCP
GetEnvironmentStringsW
SetConsoleCtrlHandler
GetFileType
ExitProcess
WideCharToMultiByte
LoadLibraryW
GetStartupInfoA
SetFilePointer
CompareStringA
FreeLibrary
GetACP
lstrlenA
Sleep
GetTimeFormatA
GetModuleFileNameA
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetDriveTypeW
IsValidLocale
WriteFile
VirtualQuery
GetUserDefaultLangID
VirtualAlloc
FlushFileBuffers
WritePrivateProfileSectionA
LoadLibraryA
GetOEMCP
GetDateFormatA
GetCurrentProcessId
GetProcAddress
HeapValidate
GetUserDefaultLCID
advapi32
RegSetValueExA
LogonUserW
GetUserNameA
LogonUserA
Sections
.text Size: 281KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 349KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ