Static task
static1
Behavioral task
behavioral1
Sample
c62c1dd1028a5ff9271ae17d183c11f6b6690af3138607f8e2312f88a4883938.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c62c1dd1028a5ff9271ae17d183c11f6b6690af3138607f8e2312f88a4883938.exe
Resource
win10v2004-20220812-en
General
-
Target
c62c1dd1028a5ff9271ae17d183c11f6b6690af3138607f8e2312f88a4883938
-
Size
152KB
-
MD5
60de05b55c2eefd8de1ae9b6f8027821
-
SHA1
31955b80603ed95daa1913962c91ad22e361ad9e
-
SHA256
c62c1dd1028a5ff9271ae17d183c11f6b6690af3138607f8e2312f88a4883938
-
SHA512
e9efa4364a2678fadb2034c0bbf51e0217912ffed7c0133277602a7088a978a893537708b97de9af0ecccbffdbd14588334eb44afb1d11befc330dc1eee9b8b7
-
SSDEEP
3072:YbpsI7I3BYeTpOBhdIQgTtgax7z4JKo4h08WroaNEjgkK5lf0:YbpP9e9OjdIbtgPKj08bMks
Malware Config
Signatures
Files
-
c62c1dd1028a5ff9271ae17d183c11f6b6690af3138607f8e2312f88a4883938.exe windows x86
8fd128f3372cc24b9af9ed7cc74b4630
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
BeginUpdateResourceA
UnlockFileEx
OpenWaitableTimerA
SetConsoleLocalEUDC
GetPrivateProfileSectionNamesW
GetDiskFreeSpaceExA
SetStdHandle
GlobalMemoryStatus
GetModuleHandleA
GetTempPathA
LZOpenFileA
VirtualAllocEx
GlobalReAlloc
SetTapeParameters
GetConsoleAliasExesW
LZStart
GetVersion
SetLastError
FindNextVolumeMountPointA
GetExitCodeProcess
GetModuleFileNameA
_lclose
GetVersionExA
GlobalFlags
GlobalSize
FlushViewOfFile
ReadConsoleOutputCharacterA
CreateFileMappingW
GetCurrencyFormatA
FindFirstFileA
HeapSize
MapUserPhysicalPagesScatter
VerifyVersionInfoA
GetDateFormatA
ReleaseMutex
HeapFree
ExitProcess
EndUpdateResourceA
lstrcatA
SetThreadUILanguage
SetFileTime
FindAtomA
GetFileAttributesA
GetConsoleInputExeNameA
GetDriveTypeA
GetAtomNameA
GetSystemWindowsDirectoryA
GetProcessVersion
GetSystemTimes
ResetEvent
GetVersion
GetCurrentProcess
GetCurrentDirectoryA
SetPriorityClass
IsProcessorFeaturePresent
ReadConsoleA
GetFileAttributesExA
OpenThread
DeleteTimerQueue
GetFileInformationByHandle
WaitCommEvent
SetConsoleMenuClose
HeapDestroy
ExitProcess
PeekConsoleInputA
Thread32Next
GetSystemWindowsDirectoryA
SetFilePointerEx
GetFileAttributesExA
EnumSystemGeoID
GetConsoleSelectionInfo
EnumSystemLanguageGroupsA
HeapSize
SetProcessPriorityBoost
QueryMemoryResourceNotification
PurgeComm
GetCommandLineA
GetFileAttributesExA
GetUserGeoID
GetSystemWindowsDirectoryA
GetCurrentThreadId
GetThreadPriorityBoost
FlushConsoleInputBuffer
WritePrivateProfileStringA
GetDefaultCommConfigA
MoveFileExA
IsBadStringPtrA
ClearCommError
GlobalGetAtomNameA
OpenSemaphoreA
GetCurrentThreadId
AddConsoleAliasA
EndUpdateResourceA
GetProcessVersion
QueryDosDeviceA
GetLastError
GetNativeSystemInfo
GetNamedPipeHandleStateA
LocalCompact
TerminateThread
WriteConsoleOutputA
CancelWaitableTimer
GetCurrentConsoleFont
TerminateThread
lstrcmpi
QueryDosDeviceA
CreateDirectoryExA
IsProcessorFeaturePresent
CreateDirectoryExA
GetProcessIoCounters
GetCurrentProcessId
GetEnvironmentVariableA
GetDefaultCommConfigA
GetConsoleTitleA
_lwrite
GetCommState
PeekConsoleInputA
GetCPInfoExA
SetWaitableTimer
GetDiskFreeSpaceA
GetNamedPipeHandleStateA
lstrcpyA
GetConsoleMode
GetComputerNameA
GetDriveTypeA
GetBinaryTypeA
advapi32
QueryRecoveryAgentsOnEncryptedFile
CredReadDomainCredentialsA
user32
AppendMenuA
MessageBeep
IsWindowUnicode
GetTopWindow
InsertMenuItemA
IsClipboardFormatAvailable
MapDialogRect
ShowScrollBar
EndTask
GetMenuInfo
DefWindowProcA
DestroyWindow
EnumPropsA
LoadIconA
DrawAnimatedRects
EnterReaderModeHelper
IsCharAlphaNumericW
DrawCaptionTempA
GrayStringA
DestroyIcon
RegisterShellHookWindow
GetLastInputInfo
SetDoubleClickTime
GetWindowThreadProcessId
MenuWindowProcA
IsDialogMessage
MessageBoxExA
GetKeyboardType
LockWindowUpdate
LoadStringA
ReplyMessage
SwapMouseButton
GetWindowTextLengthA
ClientThreadSetup
DialogBoxIndirectParamA
DlgDirSelectExA
BeginPaint
IsServerSideWindow
SendMessageTimeoutA
DialogBoxIndirectParamA
TileChildWindows
EnumChildWindows
GetTabbedTextExtentA
UnlockWindowStation
ChangeDisplaySettingsExW
DrawTextExA
CreateDialogParamA
UpdateLayeredWindow
GetKeyboardLayoutList
CliImmSetHotKey
MessageBoxIndirectA
GetScrollBarInfo
PostQuitMessage
GetRawInputDeviceInfoA
PostMessageA
ChangeMenuA
OpenIcon
SetMenuInfo
DrawTextA
LoadAcceleratorsA
SetTimer
LoadLocalFonts
EnumPropsExA
CopyRect
PostMessageA
SetMessageQueue
UnpackDDElParam
CopyImage
ImpersonateDdeClientWindow
GetWindow
GrayStringA
SendIMEMessageExA
SetMenuContextHelpId
SetWindowTextA
SetClipboardViewer
SendInput
GetUserObjectSecurity
EnumDisplaySettingsExW
GrayStringA
RegisterMessagePumpHook
SetMenuItemBitmaps
opengl32
glLightModeli
d3d8
Direct3DCreate8
d3d8thk
OsThunkD3dContextCreate
dpnet
DirectPlay8Create
Sections
CODE Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE