Static task
static1
Behavioral task
behavioral1
Sample
c4627637a8d081a10d5d13eac03a41e8de3ae02be7170b03bfc750154f90e314.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c4627637a8d081a10d5d13eac03a41e8de3ae02be7170b03bfc750154f90e314.exe
Resource
win10v2004-20220812-en
General
-
Target
c4627637a8d081a10d5d13eac03a41e8de3ae02be7170b03bfc750154f90e314
-
Size
1.0MB
-
MD5
06d982f997a6d6c208e6e8290cd64b30
-
SHA1
9d40fb06cfa56c87e730c5d7dc948f6cd3ca5763
-
SHA256
c4627637a8d081a10d5d13eac03a41e8de3ae02be7170b03bfc750154f90e314
-
SHA512
c9f14417d0dedc123fc934e5de57f167c8cdf278d38bf3dea954ecffa07276c5fec9108a59e23245c1bbe21ffd88355477d5c357aff749607e30dae8b883e368
-
SSDEEP
24576:xdlR5e8PVlHsl1D1EQoVsx5dHTUxTzNXGv:r35e8PjHYd1EQmsxDkne
Malware Config
Signatures
Files
-
c4627637a8d081a10d5d13eac03a41e8de3ae02be7170b03bfc750154f90e314.exe windows x86
371817c6f0f99acf4a81b96bc7f552be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynW
GetTempPathW
DeleteFileW
MoveFileW
Sleep
lstrlenA
SetEndOfFile
CreateFileA
GetLocalTime
GetCurrentProcessId
GetModuleFileNameW
CloseHandle
CreateFileW
GetTickCount
GetEnvironmentVariableW
GetLastError
TerminateProcess
OpenProcess
GetFileAttributesW
WriteFile
ReadFile
GetLongPathNameW
GetFileSize
SizeofResource
LoadResource
FindResourceW
FreeResource
LockResource
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
WaitForSingleObject
ReleaseMutex
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
lstrcatW
lstrcpyW
lstrcmpiW
HeapAlloc
GetProcessHeap
GetCurrentProcess
HeapFree
SetLastError
GetProcAddress
GetModuleHandleA
GetVersionExW
LoadLibraryW
FreeLibrary
LoadLibraryExW
InterlockedDecrement
SetFilePointer
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
RtlUnwind
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeW
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
user32
GetMessageW
TranslateAcceleratorW
DispatchMessageW
wsprintfW
GetSystemMetrics
LoadImageW
SetTimer
LoadCursorW
RegisterClassExW
PostQuitMessage
DestroyWindow
DefWindowProcW
KillTimer
CreateWindowExW
GetWindowThreadProcessId
EnumWindows
GetWindowLongW
GetWindowTextW
TranslateMessage
shell32
SHGetFolderPathW
ord165
Shell_NotifyIconW
ShellExecuteW
shlwapi
PathFileExistsW
PathRemoveFileSpecW
UrlIsW
UrlGetPartW
PathStripPathW
rpcrt4
UuidFromStringW
advapi32
RegOpenKeyExW
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegConnectRegistryW
RegCreateKeyW
RegQueryValueExW
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
oleaut32
SysFreeString
VariantClear
VariantInit
SysAllocString
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 379KB - Virtual size: 379KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 386KB - Virtual size: 386KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE