Static task
static1
Behavioral task
behavioral1
Sample
c07c2b56dc590152becb3fed089fdac6b32f8f946cc09821f4bc30ebd48a444f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c07c2b56dc590152becb3fed089fdac6b32f8f946cc09821f4bc30ebd48a444f.exe
Resource
win10v2004-20220812-en
General
-
Target
c07c2b56dc590152becb3fed089fdac6b32f8f946cc09821f4bc30ebd48a444f
-
Size
416KB
-
MD5
903bebfe3ab3d40cadb698cf811f8d90
-
SHA1
1c454640e3713d50816fc4e4629177168158719d
-
SHA256
c07c2b56dc590152becb3fed089fdac6b32f8f946cc09821f4bc30ebd48a444f
-
SHA512
2e5f58c35891494959adc3e27a4bb321113b9bace6287ac8abf3c11becd0dbe06a93e0e845d5de307274f10514c8b556dc671a922101815e7ef5e4687ae9fdd1
-
SSDEEP
12288:cgg9tTe+tQmqelgczlFbbi68nnmh0d4c:rgftXqelg6Lbqmad4c
Malware Config
Signatures
Files
-
c07c2b56dc590152becb3fed089fdac6b32f8f946cc09821f4bc30ebd48a444f.exe windows x86
b3861b4d8d37d06d30af327a1cfa6652
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateDirectoryA
GetPriorityClass
ResumeThread
GetCommandLineA
GetFileAttributesW
HeapSize
ReadConsoleW
GlobalSize
VirtualProtect
GetProcessHeap
GetModuleHandleA
ResumeThread
GetLocaleInfoA
WriteFile
IsBadReadPtr
GetStdHandle
SuspendThread
DeleteFileA
GetDriveTypeA
CreatePipe
SetEndOfFile
user32
DestroyMenu
GetWindowLongA
PeekMessageA
DispatchMessageA
SetCursor
GetWindowLongA
DestroyIcon
GetWindowTextW
SetRect
DrawIcon
LoadCursorA
GetScrollInfo
wsprintfA
els
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 410KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE