Static task
static1
Behavioral task
behavioral1
Sample
c42b4f8ea71de7eaa84fbfcb0cfe427ccafca1428a4eb9d359a57cf5bf27b741.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c42b4f8ea71de7eaa84fbfcb0cfe427ccafca1428a4eb9d359a57cf5bf27b741.exe
Resource
win10v2004-20220812-en
General
-
Target
c42b4f8ea71de7eaa84fbfcb0cfe427ccafca1428a4eb9d359a57cf5bf27b741
-
Size
776KB
-
MD5
01bab6fd3be63b1af06f90e3a7aa6e81
-
SHA1
3017155d0f23f97110643ce8feebf77208e583d9
-
SHA256
c42b4f8ea71de7eaa84fbfcb0cfe427ccafca1428a4eb9d359a57cf5bf27b741
-
SHA512
f837a83eebfe5b8ced1b23ba1a5797019ca44a58fced7787672c08f569a9d3cdc343abc63731189ca69f325cfd9333816f5aca49505f5889c78a06399b037b3b
-
SSDEEP
24576:k3uH1miOtAnyLSymD4NaW6SmLnbDkl9Cz:k3uH1sMyLJmDiajSmrPkXCz
Malware Config
Signatures
Files
-
c42b4f8ea71de7eaa84fbfcb0cfe427ccafca1428a4eb9d359a57cf5bf27b741.exe windows x86
c264eccc7d4038aaf5ff9b33dc3ea93c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
InitiateSystemShutdownA
CryptAcquireContextW
RegConnectRegistryW
CryptGetUserKey
LogonUserA
RegEnumKeyA
DuplicateToken
CryptSetProviderExW
RegQueryInfoKeyW
RegRestoreKeyA
comctl32
ImageList_GetDragImage
CreateStatusWindowA
CreateUpDownControl
ImageList_GetImageRect
ImageList_Destroy
ImageList_SetFilter
InitCommonControlsEx
shell32
SHAppBarMessage
SHGetDesktopFolder
kernel32
IsBadWritePtr
RtlUnwind
CompareStringW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryA
LCMapStringW
TlsFree
GetStartupInfoA
HeapAlloc
SetHandleCount
WriteConsoleInputA
UnhandledExceptionFilter
GetFileAttributesExA
InterlockedExchange
SetConsoleTextAttribute
LeaveCriticalSection
EnumResourceLanguagesA
GetCurrentProcess
FileTimeToSystemTime
GetStdHandle
GetFileType
WideCharToMultiByte
OpenMutexA
LCMapStringA
AddAtomA
TerminateProcess
GetCurrentProcessId
GetLogicalDriveStringsW
TlsAlloc
HeapCreate
GetStringTypeA
QueryPerformanceCounter
CreateMailslotA
FreeEnvironmentStringsA
InterlockedDecrement
RemoveDirectoryW
SetLastError
ExitProcess
GetModuleFileNameW
FoldStringA
WaitForDebugEvent
GetCPInfo
GetVersion
HeapDestroy
GlobalGetAtomNameA
ReadFile
HeapFree
GetSystemTime
VirtualQueryEx
CompareStringA
SetFilePointer
CloseHandle
GetTickCount
CreateDirectoryA
GetCurrentThreadId
GetEnvironmentStringsA
SetConsoleWindowInfo
GetCurrentDirectoryW
GetEnvironmentStrings
DeleteCriticalSection
GetModuleFileNameA
MultiByteToWideChar
GetLastError
TlsSetValue
ExitThread
lstrcat
GetCommandLineW
GetCommandLineA
GetStartupInfoW
WriteFile
CreateMutexW
WritePrivateProfileStructW
IsValidLocale
GetLocalTime
lstrcpy
SetThreadAffinityMask
GetModuleHandleA
VirtualAlloc
ReadConsoleW
FlushFileBuffers
GetStringTypeW
VirtualQuery
CreateMutexA
GetProcAddress
TlsGetValue
HeapReAlloc
SetEnvironmentVariableA
InterlockedIncrement
InitializeCriticalSection
GetCurrentThread
CreateFileA
SetStdHandle
GetTimeZoneInformation
VirtualFree
EnterCriticalSection
GetSystemTimeAsFileTime
user32
MoveWindow
SetMenuItemInfoW
SetWindowsHookExA
DrawTextA
CharUpperA
CreateDesktopA
PostQuitMessage
DdeCmpStringHandles
FillRect
UnregisterHotKey
LoadCursorFromFileW
RegisterClassExA
GetWindowModuleFileNameW
RegisterClassA
SetCaretBlinkTime
GetMenuInfo
CallWindowProcA
DdeDisconnectList
LoadMenuW
SystemParametersInfoA
comdlg32
LoadAlterBitmap
GetSaveFileNameW
ReplaceTextA
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 392KB - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ