Static task
static1
Behavioral task
behavioral1
Sample
5c2a678d6810bed9347107fcd9c8ce6f9f3dee62c14fc377c1e0362c40eafb77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c2a678d6810bed9347107fcd9c8ce6f9f3dee62c14fc377c1e0362c40eafb77.exe
Resource
win10v2004-20220901-en
General
-
Target
5c2a678d6810bed9347107fcd9c8ce6f9f3dee62c14fc377c1e0362c40eafb77
-
Size
201KB
-
MD5
49d283c33c2ba4e3a9239339a641ccd7
-
SHA1
c188dd1c459514aa1f27fac28494fd9f65e0e782
-
SHA256
5c2a678d6810bed9347107fcd9c8ce6f9f3dee62c14fc377c1e0362c40eafb77
-
SHA512
378d1fc74784471ed330482d4e3455f47aa3848e0ce8ade6ed87d8a953fb2e76f440392b1eae2f5b82bf6c53bebb8b9a721324919bc076baf5aa6c78b762ca1f
-
SSDEEP
3072:85zs224LTWtwlDF26RG9ShHmx6UyVTnrOBF2rDz87EPUWKDzy7Bz2SFV:85zRxTWOk6WUnr+sEkfKXYZF
Malware Config
Signatures
Files
-
5c2a678d6810bed9347107fcd9c8ce6f9f3dee62c14fc377c1e0362c40eafb77.exe windows x86
0c336e72e98908a8edfbaff4191b7837
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderLocation
FindExecutableA
ShellAboutW
DragQueryFileW
SHGetSettings
ShellExecuteW
SHFileOperation
SHBrowseForFolderA
CommandLineToArgvW
SheSetCurDrive
RealShellExecuteA
SHGetPathFromIDList
SHGetPathFromIDListA
ShellExecuteExW
ExtractIconW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ExtractAssociatedIconW
SHChangeNotify
SHAddToRecentDocs
SHQueryRecycleBinW
DragFinish
SHGetInstanceExplorer
SHGetFileInfoA
comdlg32
FindTextA
ReplaceTextW
FindTextW
GetSaveFileNameA
ChooseColorA
ReplaceTextA
GetOpenFileNameW
PageSetupDlgA
PrintDlgW
PrintDlgA
GetFileTitleA
ChooseFontA
wininet
SetUrlCacheEntryGroup
FindNextUrlCacheEntryW
InternetGetCertByURL
GopherFindFirstFileA
GopherGetAttributeA
UnlockUrlCacheEntryFileW
InternetLockRequestFile
ShowCertificate
InternetWriteFile
SetUrlCacheEntryGroupA
user32
PostMessageW
GetMonitorInfoA
SetWindowsHookW
SetWindowLongA
GetClipboardViewer
GetDlgItemTextA
PackDDElParam
SetCapture
UnregisterClassA
CallMsgFilter
SetFocus
GetCaretPos
WindowFromPoint
TrackPopupMenuEx
FindWindowW
MapVirtualKeyA
kernel32
FindResourceW
GetProcAddress
GetTickCount
SystemTimeToTzSpecificLocalTime
HeapAlloc
TerminateProcess
GetSystemTimeAsFileTime
GetCalendarInfoW
CreateFileMappingW
InterlockedExchange
WriteConsoleOutputCharacterW
GetConsoleTitleW
ResetEvent
VirtualAllocEx
HeapFree
WriteFile
CloseHandle
VirtualQuery
GetCurrencyFormatA
ExitProcess
WriteConsoleOutputW
HeapReAlloc
GetModuleHandleA
LocalShrink
SetFileTime
GetTempPathW
GetThreadTimes
MapViewOfFile
ReadConsoleInputW
EnumCalendarInfoExA
ReadConsoleOutputCharacterA
GetVersion
RtlUnwind
SetConsoleCtrlHandler
GetCurrentProcess
LoadLibraryA
FlushConsoleInputBuffer
GetCurrentProcessId
GetModuleFileNameA
QueryPerformanceCounter
lstrlenW
VirtualAlloc
GetCurrentThreadId
advapi32
RegCreateKeyW
RegLoadKeyA
CryptGenRandom
CryptGetUserKey
LookupSecurityDescriptorPartsW
RegSaveKeyA
RegRestoreKeyW
StartServiceA
LogonUserW
RegSetKeySecurity
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
CryptGetDefaultProviderW
RegEnumValueA
CryptEncrypt
RegRestoreKeyA
CryptImportKey
LookupPrivilegeValueW
CryptVerifySignatureW
CryptSetProviderExA
RegDeleteValueW
CryptDestroyKey
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ