Static task
static1
Behavioral task
behavioral1
Sample
1c0f950260b273879bde86135fbc1ee986a88068218556cef1409fb1c1239540.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c0f950260b273879bde86135fbc1ee986a88068218556cef1409fb1c1239540.exe
Resource
win10v2004-20220901-en
General
-
Target
1c0f950260b273879bde86135fbc1ee986a88068218556cef1409fb1c1239540
-
Size
176KB
-
MD5
06d3c9598c0e4a69ebd4186a426e11eb
-
SHA1
01aae2c90a80e1204be476e91a0893953c401c96
-
SHA256
1c0f950260b273879bde86135fbc1ee986a88068218556cef1409fb1c1239540
-
SHA512
98fc6ee6808d1dc555e012189a68ed32c07431ed3997a3da5006de3a8b53f0383a463de04ed98df6fab56e276c78e556da4a494a74bb47845a5e03f281e547d3
-
SSDEEP
3072:Bepi2xb7+jUHUqVHIKpWia2peWKokmg4WtYK8EP27+KRrHyhZSzzsg2V:BepiS5LcBWKoDjWWV+KRrW8zog
Malware Config
Signatures
Files
-
1c0f950260b273879bde86135fbc1ee986a88068218556cef1409fb1c1239540.exe windows x86
12d38f60d53d10a4356467e0274ad3cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
lstrcpyA
lstrcpyW
ResumeThread
CloseHandle
WTSGetActiveConsoleSessionId
GetProcAddress
ExitProcess
RtlMoveMemory
lstrcatA
GetProcessHeap
SetUnhandledExceptionFilter
HeapAlloc
SetErrorMode
lstrlenA
SwitchToThread
ntdll
NtAllocateVirtualMemory
user32
SetTimer
EndPaint
GetMessageW
KillTimer
BeginPaint
TranslateMessage
RegisterClassExW
CreateWindowExW
ValidateRect
DefWindowProcW
DispatchMessageW
gdi32
Rectangle
SetTextColor
LineTo
Ellipse
CreatePen
CreateFontIndirectA
SelectObject
TextOutW
advapi32
DuplicateTokenEx
comctl32
ord17
wtsapi32
WTSQueryUserToken
Sections
.text Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ