Static task
static1
Behavioral task
behavioral1
Sample
c7c68cf2f23a3cb1d6bceb297f0f79646773e14a50099be4fafe28f053e347cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7c68cf2f23a3cb1d6bceb297f0f79646773e14a50099be4fafe28f053e347cf.exe
Resource
win10v2004-20220812-en
General
-
Target
c7c68cf2f23a3cb1d6bceb297f0f79646773e14a50099be4fafe28f053e347cf
-
Size
303KB
-
MD5
5ae6782f3154ceb106be777922983d50
-
SHA1
403eaccdd9fbf408c7e7aa53eae892e6796c9e26
-
SHA256
c7c68cf2f23a3cb1d6bceb297f0f79646773e14a50099be4fafe28f053e347cf
-
SHA512
0f32e3c899d6798ab4f84cadfee6b38431f861c045eeb606a8c610a61591e6ccc8ed99aaffd9a5e7bf462e0bfff91f19a2c939040882213a073486e2abbfa9b8
-
SSDEEP
6144:IMzbCjA71CW6PzZu5d68H5I8OG6egWFjLt6qNEXLFSNopxCzR1:f6c71OucMVRg2PtWLFnp8zR1
Malware Config
Signatures
Files
-
c7c68cf2f23a3cb1d6bceb297f0f79646773e14a50099be4fafe28f053e347cf.exe windows x86
126807d47c7a2aab2f07b8f9793b155b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ReadConsoleW
CreateDirectoryA
GetFileAttributesW
IsBadReadPtr
GetDriveTypeA
GetProcessHeap
SuspendThread
DeleteFileA
ResumeThread
VirtualProtect
HeapSize
GetLocaleInfoA
ResumeThread
GetCommandLineA
GetStdHandle
GetModuleHandleA
WriteFile
GetPriorityClass
GlobalSize
SetLocalTime
CreatePipe
user32
DestroyIcon
PeekMessageA
GetWindowLongA
SetCursor
LoadCursorA
GetMessageA
SetRect
GetWindowTextW
GetWindowLongA
DispatchMessageA
DestroyMenu
DrawIcon
wsprintfA
els
DllGetClassObject
DllRegisterServer
DllUnregisterServer
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE