Static task
static1
Behavioral task
behavioral1
Sample
c16302743ec70495547930ea791fa4df592f562f55ceaf0b4e60b0239c5240fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c16302743ec70495547930ea791fa4df592f562f55ceaf0b4e60b0239c5240fe.exe
Resource
win10v2004-20220812-en
General
-
Target
c16302743ec70495547930ea791fa4df592f562f55ceaf0b4e60b0239c5240fe
-
Size
883KB
-
MD5
fed5f7ce674cd65f5ef84d4b6b224831
-
SHA1
c2a6c745927c539842ab610ef7fc2f385032f9c4
-
SHA256
c16302743ec70495547930ea791fa4df592f562f55ceaf0b4e60b0239c5240fe
-
SHA512
b327be367c65fecdb4ac5606ac958bfc4fc1fed0ac9090fc2d468838c287b33dc0760f258248866a5e3bbd8d85944efb7cffaa900dde5659892b03cfa10fb4c6
-
SSDEEP
6144:FTd4JCENzsXwY39F01I9Fxe36qM7DB7GkiiEKIEAVBnq2faHBeqYsSOwYz4xyEEa:kvNUh40fk6DnB6kyTo2CHBF2xh
Malware Config
Signatures
Files
-
c16302743ec70495547930ea791fa4df592f562f55ceaf0b4e60b0239c5240fe.exe windows x86
cb001a2caa1be5b38115909b7678e57d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
GetProcAddress
lstrlenA
WriteFile
WinExec
WaitForMultipleObjects
SystemTimeToFileTime
Sleep
SetFilePointer
SetErrorMode
SetEndOfFile
ReadFile
QueryPerformanceCounter
LeaveCriticalSection
IsDBCSLeadByte
InitializeCriticalSection
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GetVersionExA
GetTimeZoneInformation
GetModuleHandleW
GetStartupInfoA
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetFileSize
GetCommandLineA
GetCPInfo
GetACP
ExitThread
ExitProcess
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreateFileA
CopyFileA
CloseHandle
VirtualAllocEx
user32
TranslateAcceleratorA
TranslateMessage
UpdateWindow
WindowFromPoint
TrackPopupMenu
ShowWindow
SetWindowPos
SetWindowLongA
SetTimer
SetMenu
SetFocus
SetDlgItemTextA
SetCursor
SetClipboardData
SetCapture
ScreenToClient
ReleaseDC
ReleaseCapture
RegisterClassA
PostQuitMessage
PostMessageA
OpenClipboard
MessageBoxA
MapVirtualKeyA
LoadStringA
LoadMenuA
LoadIconA
LoadCursorA
LoadAcceleratorsA
KillTimer
IsWindow
InvalidateRect
GetWindowTextLengthA
GetWindowRect
GetWindowLongA
GetWindow
GetSubMenu
GetMessageA
GetMenu
GetKeyState
GetFocus
GetDlgItemTextA
GetDlgItem
GetDesktopWindow
GetDC
GetCursorPos
GetClipboardData
GetClientRect
GetCapture
FillRect
EndPaint
EndDialog
EnableWindow
EnableMenuItem
EmptyClipboard
DispatchMessageA
DialogBoxParamA
DestroyWindow
DestroyMenu
DeleteMenu
DefWindowProcA
DdeUninitialize
DdeInitializeA
DdeFreeStringHandle
DdeDisconnect
DdeCreateStringHandleA
DdeConnect
DdeClientTransaction
CreateWindowExA
CloseClipboard
ClientToScreen
CheckMenuItem
BeginPaint
LoadIconW
MoveWindow
gdi32
DeleteDC
DeleteObject
EndDoc
EndPage
EndPath
EnumFontFamiliesA
ExtCreatePen
ExtTextOutA
FillPath
GdiFlush
GetBkColor
GetBkMode
GetClipBox
GetClipRgn
GetDeviceCaps
GetObjectA
DPtoLP
GetTextAlign
GetTextColor
GetTextExtentPoint32A
GetTextMetricsA
IntersectClipRect
LPtoDP
LineTo
MoveToEx
PolyBezierTo
RealizePalette
RestoreDC
SaveDC
SelectClipPath
SelectClipRgn
SelectObject
SelectPalette
CreateSolidBrush
CreateRectRgn
CreatePen
CreatePalette
CreateFontIndirectA
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
BeginPath
GetSystemPaletteEntries
CreateMetaFileA
StrokePath
StretchDIBits
StartPage
StartDocA
SetTextColor
SetTextAlign
SetPolyFillMode
SetDIBitsToDevice
SetBkMode
SetBkColor
comdlg32
PrintDlgA
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegCreateKeyA
RegSetValueExA
RegSetValueA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueA
shell32
DragAcceptFiles
DragQueryFileA
Sections
.text Size: 636KB - Virtual size: 636KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
62 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
61 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
60 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
59 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
58 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
57 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
56 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
55 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
54 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
53 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
52 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
51 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
5 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ