Static task
static1
Behavioral task
behavioral1
Sample
c6c958d69d83916046c4df1cbd41c1dd2f222c1e6827ab6dfeb9c5b191dce539.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6c958d69d83916046c4df1cbd41c1dd2f222c1e6827ab6dfeb9c5b191dce539.exe
Resource
win10v2004-20220812-en
General
-
Target
c6c958d69d83916046c4df1cbd41c1dd2f222c1e6827ab6dfeb9c5b191dce539
-
Size
29KB
-
MD5
a2b3d2641eacac2c4e395a65299ad78c
-
SHA1
b050bdce5bf3ef7fac5b931c1e2d9934971079db
-
SHA256
c6c958d69d83916046c4df1cbd41c1dd2f222c1e6827ab6dfeb9c5b191dce539
-
SHA512
44f2c5331316655220beeacf872ae45476c072fc5ddbe9a1adb28cbcf25c3f61b50c9ed1a4c1c936ed4ab2b68c8248343f973bd7daac6403e2280065a050d7a5
-
SSDEEP
384:0HGiVkI+A7dRYtBYDjm6DlfceRNO9tH9dUWwyIGZwfW+mtf3JdFpigsOGNq:2VwCYtBYDjmCl4dUGRZwf8pJ3p3srq
Malware Config
Signatures
Files
-
c6c958d69d83916046c4df1cbd41c1dd2f222c1e6827ab6dfeb9c5b191dce539.exe windows x86
c4f9c631cb4b5ff374c717369cff02ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
msvcrt
realloc
_strnicmp
_onexit
_iob
strtol
wcslen
free
_ftol
_initterm
wcscmp
_snwprintf
malloc
_adjust_fdiv
_except_handler3
swprintf
_wcsicmp
wcscpy
wcsncmp
__dllonexit
_wtoi
_local_unwind2
_itow
_vsnwprintf
fwrite
advapi32
RegOpenKeyExW
FreeSid
InitializeSecurityDescriptor
OpenThreadToken
AllocateAndInitializeSid
RegCloseKey
RegSetValueExW
RegEnumKeyExA
OpenProcessToken
RegQueryValueExW
GetTokenInformation
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyExA
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegEnumValueW
RegDeleteValueA
RegDeleteKeyA
kernel32
SizeofResource
IsBadCodePtr
AddAtomW
LoadResource
VirtualFree
lstrcatW
GetFullPathNameW
SetFileAttributesA
CreateMutexA
MulDiv
GetLastError
ExitProcess
FindResourceA
CreateFileMappingW
VirtualAlloc
CreateMutexW
CopyFileW
GetCurrentProcess
LockResource
IsValidCodePage
WriteConsoleW
OutputDebugStringW
CreateDirectoryA
CreateProcessW
GetCurrentDirectoryW
GetComputerNameW
DeviceIoControl
ExpandEnvironmentStringsA
shell32
Shell_GetCachedImageIndex
PickIconDlg
SHDefExtractIconW
DllInstall
Shell_GetImageLists
DriveType
DllUnregisterServer
DllGetClassObject
Shell_MergeMenus
IsLFNDrive
SHILCreateFromPath
SHCoCreateInstance
DragFinish
DAD_DragEnterEx
DllCanUnloadNow
IsNetDrive
DAD_DragLeave
SHChangeNotifyRegister
DragAcceptFiles
PifMgr_OpenProperties
SHStartNetConnectionDialogW
RestartDialog
PathQualify
GetFileNameFromBrowse
DAD_DragMove
ole32
CoCancelCall
CoCreateInstanceEx
user32
SendMessageA
IsWindow
SetWindowPos
wsprintfW
SetFocus
PostMessageW
GetWindowRect
GetSystemMetrics
GetClientRect
LoadStringW
DispatchMessageA
SetWindowLongW
rpcrt4
DllGetClassObject
NDRSContextMarshallEx
NdrByteCountPointerFree
CStdStubBuffer_CountRefs
MesInqProcEncodingId
NDRcopy
NdrConformantStructBufferSize
NdrByteCountPointerBufferSize
MesHandleFree
NdrClientInitialize
NDRSContextMarshall
NdrAsyncClientCall
Sections
.textbss Size: - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1024B - Virtual size: 709B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.debug Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE