Static task
static1
Behavioral task
behavioral1
Sample
c1b6c1fe73b11662e7bac4d054fd93513ac568a434fb147070c464bb5249c06c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1b6c1fe73b11662e7bac4d054fd93513ac568a434fb147070c464bb5249c06c.exe
Resource
win10v2004-20220812-en
General
-
Target
c1b6c1fe73b11662e7bac4d054fd93513ac568a434fb147070c464bb5249c06c
-
Size
209KB
-
MD5
5085a4b2e4c13ba97d9f24c8f0fae7d5
-
SHA1
2cb4b26a6ab847278513cd06aa6a78dfae398eb9
-
SHA256
c1b6c1fe73b11662e7bac4d054fd93513ac568a434fb147070c464bb5249c06c
-
SHA512
661f8d2e08513952f64dd8da5759dd344499feb42ec1dad65bd89a5e62b80aaa6b53fc817059a490a0749f80dc265236c9733f85d542834cdc18451ffc4d1076
-
SSDEEP
6144:rDWUQ0CGVUHU0JPrxT+aO1nZoPZ02D8u0t:+UtLVUHNjxJEgQ5t
Malware Config
Signatures
Files
-
c1b6c1fe73b11662e7bac4d054fd93513ac568a434fb147070c464bb5249c06c.exe windows x86
f4417d88364313218dff1ec40b8a564b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
SetEvent
GetProcessHeap
FreeLibrary
GetCurrentProcessId
MultiByteToWideChar
GetLastError
SetUnhandledExceptionFilter
GetModuleFileNameA
GetCurrentThread
lstrlenA
GetACP
SetThreadPriority
CreateEventW
WaitForMultipleObjects
WideCharToMultiByte
SetEndOfFile
IsBadWritePtr
GetDiskFreeSpaceW
GetProcAddress
WriteFile
GetFileSize
ReleaseSemaphore
InterlockedDecrement
GetFileAttributesW
CreateFileW
CreateSemaphoreW
InterlockedIncrement
SetLastError
GetProfileIntA
VirtualFree
GlobalFindAtomW
GetQueuedCompletionStatus
HeapAlloc
lstrcpynW
GetTickCount
CloseHandle
GetPrivateProfileStringW
ResetEvent
MulDiv
GlobalMemoryStatus
GlobalAlloc
GlobalFree
GlobalUnlock
lstrcpyA
SetFilePointer
GetThreadPriority
GetLocaleInfoA
lstrcpyW
GetSystemTimeAsFileTime
WaitForSingleObject
lstrcmpW
GetFullPathNameW
HeapFree
InitializeCriticalSection
ReadFile
GetVersionExW
InterlockedExchange
CreateThread
GlobalHandle
GlobalLock
IsBadCodePtr
GetCurrentProcess
IsBadReadPtr
LoadLibraryW
QueryPerformanceCounter
LeaveCriticalSection
lstrlenW
lstrcmpiW
DeleteCriticalSection
user32
GetDesktopWindow
LoadStringW
ShowWindow
GetDlgItemInt
GetDC
InvalidateRect
SetDlgItemInt
IsRectEmpty
SendMessageW
CreateDialogParamW
TranslateMessage
IsWindow
CheckRadioButton
IsWindowVisible
GetAsyncKeyState
SetCursor
PeekMessageW
DefWindowProcW
EnableWindow
SetWindowLongW
GetDlgItem
LoadCursorW
MoveWindow
ClientToScreen
GetWindowRect
GetClientRect
DestroyWindow
GetWindowLongW
ReleaseDC
CheckDlgButton
DispatchMessageW
SetDlgItemTextW
msnetobj
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
oleaut32
VarBstrFromDate
VarBstrFromI2
VarBstrFromUI4
VarBstrFromI8
VarBstrFromR8
VarBstrFromUI8
VarBstrFromI4
VarBstrFromI1
VarBstrFromR4
VarBstrFromDisp
VarBstrFromCy
VarBstrFromUI1
VarBstrFromDec
VarBstrFromUI2
msls31
LssbGetObjDimSubline
LssbGetVisibleDcpInSubline
LsCompressSubline
LssbGetPlsrunsFromSubline
LssbGetDurTrailWithPensInSubline
LssbGetNumberDnodesInSubline
msoeacct
ValidEmailAddress
GetDllMajorVersion
HrCreateAccountManager
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ