Static task
static1
Behavioral task
behavioral1
Sample
0c078519ea379e5392b1601bdc939ad6907234348e0e1c288ed30864730aaf66.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c078519ea379e5392b1601bdc939ad6907234348e0e1c288ed30864730aaf66.exe
Resource
win10v2004-20220901-en
General
-
Target
0c078519ea379e5392b1601bdc939ad6907234348e0e1c288ed30864730aaf66
-
Size
88KB
-
MD5
019f1081aa11fbf4b45b6bc18bfe1200
-
SHA1
0bc2c50b6cbcc444baa6955b5edf99d6669492c1
-
SHA256
0c078519ea379e5392b1601bdc939ad6907234348e0e1c288ed30864730aaf66
-
SHA512
f148fd8f84940a9f548bffdeceaf49f848ac89c8d7ee65c85ff94eda0e7a441667dc0bdc5da512c267c841c6c418afb5f30ad01978ca54a2e4d3fe8a96483858
-
SSDEEP
1536:yLcW+lUITF/4U1SCLRtuiQ5wBB9b/yfzNF1+vQCnN9a:O+lfFSgRtuiQ5IKH+Ze
Malware Config
Signatures
Files
-
0c078519ea379e5392b1601bdc939ad6907234348e0e1c288ed30864730aaf66.exe windows x86
e4208b4b6f65472c30062343404b363d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
GetCurrentThreadId
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrlenW
InterlockedDecrement
FreeLibrary
GetProcAddress
LoadLibraryW
GetLongPathNameW
GetModuleFileNameW
InterlockedIncrement
GetOEMCP
GetACP
HeapFree
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoW
GetVersion
ExitProcess
HeapAlloc
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineW
GetCommandLineA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
WriteFile
IsBadReadPtr
IsBadCodePtr
LoadLibraryA
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetCPInfo
user32
DefWindowProcW
LoadStringW
DestroyWindow
ole32
CoUninitialize
CoInitialize
shlwapi
PathRemoveFileSpecW
PathAddBackslashW
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE