Static task
static1
Behavioral task
behavioral1
Sample
c623ac51368e8c88c015c3876867352cb1a907da60caa496d5f1b46413bc1ca4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c623ac51368e8c88c015c3876867352cb1a907da60caa496d5f1b46413bc1ca4.exe
Resource
win10v2004-20220812-en
General
-
Target
c623ac51368e8c88c015c3876867352cb1a907da60caa496d5f1b46413bc1ca4
-
Size
89KB
-
MD5
f89ed56a873dd5add3177a547b9a267a
-
SHA1
f5ba88a4d0ffb5d12658a5d1806c5f67450a4704
-
SHA256
c623ac51368e8c88c015c3876867352cb1a907da60caa496d5f1b46413bc1ca4
-
SHA512
c8078cfffd8f1c4ff855278b9ee111d3538c6a7c02a090492566926b1242bf61c902d5904a5db0d115073c17d68a2abbd09d00ef3657f390a8a23f62123a0ea4
-
SSDEEP
1536:s4KHGHbrQVpSvIswv4cbacQazBhV2aSKJvaNYvNPS8kGXSu9s:swHbrD4v4cb9QazBL2a9JNdxkGTs
Malware Config
Signatures
Files
-
c623ac51368e8c88c015c3876867352cb1a907da60caa496d5f1b46413bc1ca4.exe windows x86
62f3d61645d9aec9377655f3d4210cd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
Shell_NotifyIconA
SHGetSpecialFolderLocation
SHGetFileInfoA
SHGetDiskFreeSpaceA
DragQueryFileA
msvcrt
strcmp
memcpy
acos
comctl32
ImageList_Add
ImageList_Create
ImageList_GetBkColor
ImageList_Write
ImageList_Remove
ImageList_Draw
ImageList_Read
ImageList_DrawEx
shlwapi
SHSetValueA
SHEnumValueA
SHQueryValueExA
SHDeleteKeyA
PathIsContentTypeA
SHStrDupA
oleaut32
VariantCopyInd
SysFreeString
OleLoadPicture
SafeArrayGetUBound
SafeArrayCreate
GetErrorInfo
SafeArrayUnaccessData
RegisterTypeLib
VariantChangeType
SafeArrayPtrOfIndex
kernel32
VirtualQuery
WideCharToMultiByte
GetACP
LoadLibraryA
GetLocaleInfoA
Sleep
SetErrorMode
SetFilePointer
GlobalAlloc
GetStringTypeW
ResetEvent
FreeLibrary
GetCurrentProcessId
GlobalAddAtomA
GetSystemDefaultLangID
lstrcpyA
VirtualAlloc
SetEndOfFile
GetCPInfo
GetFileAttributesA
CreateFileA
GetModuleHandleA
GetFullPathNameA
HeapAlloc
GetStartupInfoA
LoadResource
GetCurrentThreadId
GlobalFindAtomA
GetStdHandle
lstrlenA
MulDiv
WriteFile
VirtualAllocEx
GetLocalTime
DeleteFileA
GetDiskFreeSpaceA
HeapFree
HeapDestroy
GetStringTypeA
GetTickCount
GetProcAddress
LocalFree
SetLastError
ReadFile
VirtualFree
GetProcessHeap
LocalAlloc
EnterCriticalSection
EnumCalendarInfoA
CreateEventA
GetFileSize
GetOEMCP
InitializeCriticalSection
GetEnvironmentStrings
GetUserDefaultLCID
SizeofResource
CreateThread
GetVersionExA
FindClose
LockResource
LoadLibraryExA
GetCurrentThread
user32
GetDCEx
RegisterClassA
CreatePopupMenu
GetMenuState
DeferWindowPos
ShowWindow
GetDesktopWindow
EqualRect
GetLastActivePopup
GetForegroundWindow
GetClientRect
GetCursor
GetIconInfo
GetCursorPos
GetKeyNameTextA
SetTimer
GetCapture
IsWindowVisible
CharLowerBuffA
GetClassInfoA
DrawFrameControl
GetClassLongA
EndDeferWindowPos
GetClipboardData
SetWindowTextA
DrawMenuBar
IsMenu
GetFocus
CharToOemA
GetDlgItem
GetKeyState
GetDC
CharLowerA
DefFrameProcA
HideCaret
Sections
CODE Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 606B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ