Static task
static1
Behavioral task
behavioral1
Sample
c740e8deb3027e569a68fa51a05457b4d476d7e83d7dd8453f345f3e866b3f5c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c740e8deb3027e569a68fa51a05457b4d476d7e83d7dd8453f345f3e866b3f5c.exe
Resource
win10v2004-20220812-en
General
-
Target
c740e8deb3027e569a68fa51a05457b4d476d7e83d7dd8453f345f3e866b3f5c
-
Size
136KB
-
MD5
91c267bd51e7c2a9a1fc945fc1ce5e4b
-
SHA1
5b35daa789cb66075c3de8a4f4eb9724f2e97fc7
-
SHA256
c740e8deb3027e569a68fa51a05457b4d476d7e83d7dd8453f345f3e866b3f5c
-
SHA512
6e9cd60c635a25c82c2c4d5e662851b493487ccfe8c4edd560057004becc72ab324f7b125cb1f637f03633aada46fff0323533610d1d5d4111e29105373dd5ec
-
SSDEEP
3072:SyvH4U5q5QGtBlwFX4ZBj8Ql8A6xY2O1KNYKsRXDPf:SyvYU5q5QrFXajt8D1YKwb
Malware Config
Signatures
Files
-
c740e8deb3027e569a68fa51a05457b4d476d7e83d7dd8453f345f3e866b3f5c.exe windows x86
d11ddb55ecf8d92e0562f0f09cdb6865
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleCP
FindFirstFileW
CreateProcessW
GetLastError
SetStdHandle
SetEndOfFile
LoadResource
SizeofResource
CopyFileW
GetVersionExW
lstrcmpiW
ExitProcess
InterlockedCompareExchange
GetTimeFormatW
Sleep
GetTimeZoneInformation
FindClose
VirtualFree
VirtualAlloc
InitializeCriticalSection
CreateDirectoryW
CompareStringA
LoadLibraryA
lstrcmpW
QueryPerformanceCounter
HeapCreate
GetCurrentProcessId
HeapAlloc
GetTickCount
GetConsoleMode
FreeLibrary
GetSystemInfo
WaitForMultipleObjects
GetCPInfo
GetCurrentDirectoryW
EnterCriticalSection
GetEnvironmentStringsW
OpenEventW
LeaveCriticalSection
GetLocaleInfoW
LoadLibraryW
GlobalAlloc
ResumeThread
ExpandEnvironmentStringsW
GlobalSize
DeleteFileW
HeapReAlloc
WaitForSingleObject
DeleteCriticalSection
GetTempPathW
VirtualAllocEx
GetProcAddress
lstrcpynW
GetLocaleInfoA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
SetFilePointer
ReadFile
GetSystemTimeAsFileTime
GetCurrentThreadId
VirtualQuery
InterlockedExchange
RtlUnwind
IsBadWritePtr
GetOEMCP
GetACP
CreateFileA
CloseHandle
HeapFree
HeapDestroy
GetFileType
SetHandleCount
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
GetCurrentProcess
TerminateProcess
GetVersionExA
GetCommandLineA
GetStartupInfoA
VirtualProtect
GetModuleHandleA
user32
TrackPopupMenu
GetScrollPos
InsertMenuItemW
GetFocus
EndDeferWindowPos
SetWindowPos
MapWindowPoints
EndPaint
GetWindowLongW
EndDialog
DeferWindowPos
DrawFocusRect
CreateCursor
IsChild
TranslateMessage
GetWindowRect
GetActiveWindow
ModifyMenuW
UnhookWindowsHookEx
LoadStringW
DispatchMessageW
AppendMenuW
GetSysColor
DragDetect
PostQuitMessage
CloseClipboard
EnableWindow
SetDlgItemTextW
RegisterWindowMessageW
IsZoomed
DestroyCursor
FindWindowW
GetClientRect
SetScrollInfo
GetDC
SetWindowsHookExW
RegisterClassW
LoadImageW
GetMonitorInfoW
GetMessageW
SetCursor
DestroyAcceleratorTable
DestroyWindow
GetParent
ScreenToClient
SetWindowLongW
GetSystemMetrics
MonitorFromWindow
RedrawWindow
ShowWindow
GetDlgItem
GetCapture
FrameRect
MessageBoxW
SetWindowPlacement
RemoveMenu
ShowCaret
CreateWindowExW
DeleteMenu
DrawTextExW
GetMenuItemID
GetDlgItemTextW
UpdateWindow
GetMenu
GetDlgCtrlID
CreatePopupMenu
GetMessageA
IsClipboardFormatAvailable
comdlg32
GetOpenFileNameA
PrintDlgA
PageSetupDlgA
GetOpenFileNameW
GetSaveFileNameA
GetFileTitleA
PrintDlgW
GetSaveFileNameW
ChooseColorA
FindTextW
ReplaceTextW
GetFileTitleW
FindTextA
ChooseColorW
ReplaceTextA
PageSetupDlgW
ChooseFontW
oleaut32
VarUI8FromDisp
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ