Static task
static1
Behavioral task
behavioral1
Sample
c1aa233cb65fc1246cf9c78c615d79e7ae75809bfe80b5351db2d797c85eb9c3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c1aa233cb65fc1246cf9c78c615d79e7ae75809bfe80b5351db2d797c85eb9c3.exe
Resource
win10v2004-20220812-en
General
-
Target
c1aa233cb65fc1246cf9c78c615d79e7ae75809bfe80b5351db2d797c85eb9c3
-
Size
79KB
-
MD5
977927e945971781da85acc616739a9f
-
SHA1
678b75ccef2e49a97904324fa569eb2f7a53dcdc
-
SHA256
c1aa233cb65fc1246cf9c78c615d79e7ae75809bfe80b5351db2d797c85eb9c3
-
SHA512
4b1dbef44f43ecd551e7051d47a35346993e6a7ad16199d0db69dffaa07a3090000bffdb1b4c158606e8920962e5351dca73f7276c2bbb16a15b419b55af62c7
-
SSDEEP
1536:dUBY0SCh3hhp9wWl6LHkILX9UhHScdndQzAhYSPTq3T+MaHlnX9:mBzvhxNqEIT9sycddcWK+MMlnt
Malware Config
Signatures
Files
-
c1aa233cb65fc1246cf9c78c615d79e7ae75809bfe80b5351db2d797c85eb9c3.exe windows x86
addb9c3afd200948bed7d09af27f3087
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetCurrentThread
GetComputerNameA
GetVersionExA
GetCurrentProcessId
GetCurrentDirectoryA
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
CreateMutexA
GetStdHandle
LockResource
LoadResource
FindResourceA
GetCurrentProcess
GetSystemDirectoryA
LocalFree
ExitProcess
VirtualAlloc
LocalAlloc
VirtualProtect
CreateEventA
advapi32
GetUserNameA
user32
GetActiveWindow
GetSystemMetrics
GetForegroundWindow
msvcrt
memset
memcpy
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ