Static task
static1
Behavioral task
behavioral1
Sample
1c838a910bafda6d190a07a75105d1e629b6568bae278399388105d617db3237.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1c838a910bafda6d190a07a75105d1e629b6568bae278399388105d617db3237.exe
Resource
win10v2004-20220812-en
General
-
Target
1c838a910bafda6d190a07a75105d1e629b6568bae278399388105d617db3237
-
Size
263KB
-
MD5
8294d9059781a135b85392cd4682ee70
-
SHA1
c2fb14c447509a40a1ee764ef5f978d104908ec7
-
SHA256
1c838a910bafda6d190a07a75105d1e629b6568bae278399388105d617db3237
-
SHA512
9d964824daea6e2ebadd84cc62fcf09655fce0d6ac62856466b59b262f0fdd142b57eb87bb998ed7e0e67ded8d043668a30a92be2689cd6d4829aa7946ad0128
-
SSDEEP
6144:/oSCCdLVDNUw4kkhulPzW1/zhYKq4lpZKeLCr/MwZVcfw+U3yrs:XPtZsvh6P4zmKblpcmCQwgfwO4
Malware Config
Signatures
Files
-
1c838a910bafda6d190a07a75105d1e629b6568bae278399388105d617db3237.exe windows x86
06afd7c0180731f6e043437ac6e6dfc5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
SetFilePointer
WaitForSingleObjectEx
LoadLibraryW
WriteFile
GetUserDefaultLCID
lstrcpyA
VirtualFree
OutputDebugStringA
ReleaseSemaphore
WaitForMultipleObjects
ResetEvent
GetModuleFileNameA
ReadFile
CreateEventA
CreateThread
InterlockedDecrement
GetOEMCP
QueryPerformanceCounter
InterlockedIncrement
GlobalFindAtomW
GlobalAlloc
HeapCreate
GetEnvironmentStringsA
FindNextFileA
OpenFileMappingA
FindClose
OpenSemaphoreA
GetSystemDefaultLangID
ReleaseMutex
WriteFileEx
GetEnvironmentStringsW
GetCurrentProcessId
CreateSemaphoreA
ExpandEnvironmentStringsA
SetEndOfFile
GetLastError
GetCPInfo
lstrcmpA
GlobalFree
DeleteCriticalSection
SetLastError
EnterCriticalSection
GetFileAttributesA
ReadFileEx
CreateDirectoryA
GetFileSize
LCMapStringW
MapViewOfFile
CreateMutexA
CompareStringW
FreeLibrary
UnmapViewOfFile
OpenEventA
GetExitCodeThread
GetSystemInfo
RemoveDirectoryA
GetModuleHandleW
OpenMutexA
FindFirstFileA
lstrlenA
CreateFileA
GetTickCount
GetUserDefaultLangID
GetProcAddress
SetThreadPriority
WaitForSingleObject
GetDiskFreeSpaceA
CloseHandle
SetEvent
msvcrt
vprintf
printf
fclose
fopen
_fullpath
strncpy
_strnicmp
_iob
_itoa
wcslen
_stricmp
fflush
sprintf
toupper
strncmp
_makepath
_splitpath
fprintf
_strupr
isprint
rand
memmove
advapi32
RegDeleteValueA
RegDeleteKeyA
AllocateAndInitializeSid
RegQueryValueExA
FreeSid
RegCloseKey
DeregisterEventSource
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegisterEventSourceA
InitializeAcl
ReportEventA
SetSecurityDescriptorDacl
GetLengthSid
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ