Behavioral task
behavioral1
Sample
1c3c26e127a3f89f7b8c3092e4a50e143fc0b1aed45bcefb8cf38a983d6a366e.exe
Resource
win7-20220812-en
General
-
Target
1c3c26e127a3f89f7b8c3092e4a50e143fc0b1aed45bcefb8cf38a983d6a366e
-
Size
580KB
-
MD5
068710300defccac15e8bee569682fff
-
SHA1
4a44425eec56c8310e3fa34ca9542a490b7d6133
-
SHA256
1c3c26e127a3f89f7b8c3092e4a50e143fc0b1aed45bcefb8cf38a983d6a366e
-
SHA512
d8bd5d3271a7d30b00447a5bcab103a87024c057b940e15e6d4a6882573fd5f7eae64c0b139e77be539f5e13915f4b8ba6eaa28d75a956d3d75afc8ac61cf8a2
-
SSDEEP
6144:abJZWua+S7vgXGCTkqe+oQePWTmzxWSilcsjhbS1Zi7DzmzAEN:abjVa9ruXTDKPn76njhbSnirOA
Malware Config
Signatures
Files
-
1c3c26e127a3f89f7b8c3092e4a50e143fc0b1aed45bcefb8cf38a983d6a366e.exe windows x86
adb374823404c7808329dad7307d8a45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToLocalFileTime
GetDriveTypeA
GetTickCount
GetLocalTime
WriteFile
GetFileInformationByHandle
SetFilePointer
ReadFile
MoveFileExA
CopyFileA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetLongPathNameA
GlobalAlloc
GlobalFree
SetFileAttributesA
DeleteFileA
GetSystemTime
GetComputerNameA
CreateDirectoryA
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLastError
WaitForMultipleObjects
ResetEvent
SetEvent
CreateEventA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WaitForSingleObject
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
LocalFree
FormatMessageA
GetFileType
FlushFileBuffers
GlobalDeleteAtom
GlobalUnlock
GlobalLock
MultiByteToWideChar
GetCurrentDirectoryA
DeleteAtom
GetCurrentThreadId
AddAtomA
RtlUnwind
RaiseException
HeapFree
HeapReAlloc
HeapAlloc
ExitThread
CreateThread
GetStartupInfoA
GetCommandLineA
ExitProcess
WideCharToMultiByte
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
HeapSize
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
CompareStringA
CompareStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoA
VirtualProtect
GetSystemInfo
InterlockedExchange
SetStdHandle
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEndOfFile
SetEnvironmentVariableA
GetModuleFileNameA
GetTimeZoneInformation
GetVersion
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SystemTimeToFileTime
OpenProcess
TerminateProcess
GetVersionExA
GetCurrentProcess
FreeLibrary
LoadLibraryA
GetProcAddress
CreateFileA
GetFileSize
CreateFileMappingA
CloseHandle
MapViewOfFile
VirtualQuery
UnmapViewOfFile
GetPrivateProfileStringA
WritePrivateProfileStringA
lstrlenA
GetFullPathNameA
GetModuleHandleW
user32
GetDC
SetDeskWallpaper
DdeAbandonTransaction
EnumDisplaySettingsExW
LoadIconA
LoadCursorFromFileW
CharNextA
comdlg32
GetFileTitleW
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
shell32
DragFinish
ole32
OleRun
shlwapi
PathIsUNCW
imm32
ImmGetContext
Sections
.text Size: 472KB - Virtual size: 472KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ