Static task
static1
Behavioral task
behavioral1
Sample
c3e05cad0ce96102a39d7177114bd94016dff8ee61ce727100c4be248177cce5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c3e05cad0ce96102a39d7177114bd94016dff8ee61ce727100c4be248177cce5.exe
Resource
win10v2004-20220812-en
General
-
Target
c3e05cad0ce96102a39d7177114bd94016dff8ee61ce727100c4be248177cce5
-
Size
187KB
-
MD5
61be3f5a0c4eb88d9e66637b253e770b
-
SHA1
386e5aa34f2f6c65a46906d7689f1fdbcd25d97d
-
SHA256
c3e05cad0ce96102a39d7177114bd94016dff8ee61ce727100c4be248177cce5
-
SHA512
0132eedeb6b61b66fb53b63d4ef788d3f59acb253921341741d2e7b57e37baae31b3459977f2785c73dcd6c352e936468d94a8b9bdcfbd63071cfa3905c9490e
-
SSDEEP
3072:XuN8tJFhvBl6qr+L6jsX6tsJpWgPlEH3HP03ZAKTA//lxcFrZEWs9GGCH:hjl6UyHipP0+KTA//gNWz1
Malware Config
Signatures
Files
-
c3e05cad0ce96102a39d7177114bd94016dff8ee61ce727100c4be248177cce5.exe windows x86
99faf2bfd6181ca1e9d60e6f2627aff3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetFileAttributesW
GetEnvironmentVariableW
WriteFile
SetFilePointer
SetEndOfFile
DeleteFileW
ReadFile
GetFileSizeEx
LocalFree
GetCommandLineW
WaitForSingleObject
GetTimeFormatW
GetLocalTime
OutputDebugStringW
CreateDirectoryW
MapViewOfFile
CreateMutexW
HeapReAlloc
WriteConsoleW
GetSystemDirectoryW
GetCurrentProcess
GetVersionExW
CloseHandle
UnmapViewOfFile
CreateFileMappingW
MapViewOfFileEx
CreateFileW
GetLastError
Sleep
GetModuleHandleW
ReleaseMutex
GetProcAddress
SetStdHandle
HeapSize
LoadLibraryW
HeapAlloc
HeapFree
RtlUnwind
DecodePointer
EncodePointer
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
ExitProcess
GetStdHandle
HeapCreate
RaiseException
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
MultiByteToWideChar
GetStringTypeW
GetProcessHeap
user32
wsprintfW
advapi32
RegSetValueExW
AllocateAndInitializeSid
GetNamedSecurityInfoW
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
RegQueryInfoKeyW
RegEnumValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
shell32
SHGetFolderPathW
shlwapi
PathAppendW
PathIsNetworkPathW
PathStripPathW
PathStripToRootW
PathRemoveFileSpecW
PathIsRelativeW
PathSkipRootW
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
DP���u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE