Static task
static1
Behavioral task
behavioral1
Sample
c2c12f037eaed386f44de67d0aa4a6c9ebce4cf884f51711f5774d630f59b639.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2c12f037eaed386f44de67d0aa4a6c9ebce4cf884f51711f5774d630f59b639.exe
Resource
win10v2004-20220901-en
General
-
Target
c2c12f037eaed386f44de67d0aa4a6c9ebce4cf884f51711f5774d630f59b639
-
Size
909KB
-
MD5
49d7aa485f5bc619fab70018135fe746
-
SHA1
35d6bc56d95159fa0b2052d3476433c4eb44915b
-
SHA256
c2c12f037eaed386f44de67d0aa4a6c9ebce4cf884f51711f5774d630f59b639
-
SHA512
30c7d79ff9000b55f300a0cef99433f11cdd2468903ae9892f482c0224891a9eca8cf0cec03b23889488c95e0ef74d686d65622c71f6a89321d50c925b22f8a8
-
SSDEEP
3072:ngv9bqpaMausTDYBh7SYmdULiiLnEKhf0TTE5jk/RtRlHAkAtzfKtLy8YFqhctm5:KZu5Zh7ydGnEIjagkAtzuNcdtxEUvLIT
Malware Config
Signatures
Files
-
c2c12f037eaed386f44de67d0aa4a6c9ebce4cf884f51711f5774d630f59b639.exe windows x86
d6b96667bcbf7c4bc651b9c377cd21db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptHashData
ProcessTrace
ReadEventLogW
SetNamedSecurityInfoExW
SystemFunction008
UninstallApplication
AddAce
CopySid
GetAce
GetAclInformation
GetLengthSid
GetSidLengthRequired
GetSidSubAuthority
GetTokenInformation
InitializeAcl
InitializeSid
IsValidSid
OpenProcessToken
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
SetSecurityDescriptorControl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
ObjectDeleteAuditAlarmA
gdi32
GetTextExtentPointW
GetClipBox
kernel32
VirtualAlloc
CloseHandle
CreateFileMappingW
GetACP
GetCommModemStatus
GetCommTimeouts
GetCurrentProcessId
GetCurrentThreadId
GlobalAlloc
GlobalFree
IsDebuggerPresent
MapViewOfFile
UnmapViewOfFile
WriteTapemark
lstrcmpW
lstrlenW
GetCurrentProcess
GetOverlappedResult
MultiByteToWideChar
ReadFile
WideCharToMultiByte
WriteFile
lstrlenA
GetProcAddress
GetModuleHandleA
ExitProcess
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
GetCurrentThread
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
RaiseException
GetCPInfo
GetOEMCP
IsValidCodePage
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
Sleep
GetFullPathNameW
GetFileAttributesW
SetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
SetHandleCount
ReadConsoleInputA
SetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
RtlUnwind
GetLocaleInfoA
GetLocaleInfoW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
HeapReAlloc
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
CreateFileA
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
FlushFileBuffers
oleaut32
VarNot
VarCySu
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 696KB - Virtual size: 705KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE