Static task
static1
Behavioral task
behavioral1
Sample
c19f72c16f56939b6a03685f8ef84c1a8352682be76345586231557749e7501d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c19f72c16f56939b6a03685f8ef84c1a8352682be76345586231557749e7501d.exe
Resource
win10v2004-20220812-en
General
-
Target
c19f72c16f56939b6a03685f8ef84c1a8352682be76345586231557749e7501d
-
Size
98KB
-
MD5
7e3af760f5e1fbd68cf8f728682ea339
-
SHA1
a73c93f12c6d30444625b82ade42e3b139140ca8
-
SHA256
c19f72c16f56939b6a03685f8ef84c1a8352682be76345586231557749e7501d
-
SHA512
18e006ee46ea1d326f25ac923047b2666f5d87acd9bf7bd9f7df91a4f785a91d6bf6f75c9867ae9763849c9a910e77c02196fddc2d839a6201057e5b44e5cf87
-
SSDEEP
1536:qT+8i0lO2bFdsnXhc1i/v5RAQQAGWGctlpiozrxz7a5CWWyaQVQdwPa2yuZchRZl:iC4ncXv5R9Fp/Jz7NWWvQVQdyGhb
Malware Config
Signatures
Files
-
c19f72c16f56939b6a03685f8ef84c1a8352682be76345586231557749e7501d.exe windows x86
8a6d3f791298f179333277ec5783835b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memcpy
tan
strncmp
calloc
kernel32
GetOEMCP
VirtualAllocEx
GetFileSize
GetModuleHandleA
LoadLibraryExA
SetThreadLocale
GetStdHandle
FindFirstFileA
EnumCalendarInfoA
MoveFileA
GetEnvironmentStrings
GetCommandLineA
GetProcAddress
GetCurrentThread
GetACP
SetFilePointer
LoadResource
GetLastError
GetUserDefaultLCID
WriteFile
ExitProcess
lstrcmpiA
VirtualAlloc
GetTickCount
GetModuleFileNameA
GlobalAlloc
LockResource
HeapFree
GetFileType
GetSystemDefaultLangID
lstrcpyA
GetVersionExA
GetFullPathNameA
LocalAlloc
CloseHandle
GetDateFormatA
GetCurrentProcessId
lstrcatA
DeleteCriticalSection
GetCurrentProcess
CreateFileA
GetDiskFreeSpaceA
LoadLibraryA
GetLocalTime
CreateEventA
LocalFree
FreeLibrary
RaiseException
SetEvent
lstrlenA
InitializeCriticalSection
LocalReAlloc
Sleep
CompareStringA
EnterCriticalSection
GetFileAttributesA
lstrcmpA
ExitThread
SizeofResource
GlobalFindAtomA
MulDiv
FreeResource
GetProcessHeap
FormatMessageA
ReadFile
SetEndOfFile
FindResourceA
CreateThread
GetCurrentThreadId
GlobalDeleteAtom
ResetEvent
GetCPInfo
GetStringTypeW
MoveFileExA
GlobalAddAtomA
user32
DrawMenuBar
GetKeyState
GetDCEx
EqualRect
GetFocus
DrawTextA
GetSubMenu
GetDC
GetActiveWindow
MessageBoxA
DefMDIChildProcA
CheckMenuItem
GetSysColorBrush
ShowWindow
SetWindowLongA
SetWindowPos
GetIconInfo
GetSysColor
DeferWindowPos
BeginPaint
IsWindowVisible
GetCapture
EndDeferWindowPos
CreateIcon
BeginDeferWindowPos
ShowScrollBar
GetClassLongA
FrameRect
IsDialogMessageA
CharNextA
GetMenuStringA
EndPaint
DrawFrameControl
GetClipboardData
DefFrameProcA
CreateWindowExA
CreateMenu
GetMenuItemID
DispatchMessageA
RegisterClassA
EnableMenuItem
GetWindow
IsChild
ClientToScreen
GetParent
GetScrollRange
CharToOemA
CreatePopupMenu
EnumThreadWindows
DrawEdge
GetMessagePos
CallWindowProcA
TrackPopupMenu
SetWindowTextA
GetClassInfoA
FindWindowA
GetPropA
IsWindowEnabled
Sections
CODE Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 835B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE