Static task
static1
Behavioral task
behavioral1
Sample
ca98e1c3f0434fa0171abf38aa11166f22c11ec2042edbfc136575f540da463f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca98e1c3f0434fa0171abf38aa11166f22c11ec2042edbfc136575f540da463f.exe
Resource
win10v2004-20220812-en
General
-
Target
ca98e1c3f0434fa0171abf38aa11166f22c11ec2042edbfc136575f540da463f
-
Size
600KB
-
MD5
10cfa5dd9ed9470c81baa2b7c59a9067
-
SHA1
dc67cc9af6f75a6483d72dbabb26f12eadc61eaa
-
SHA256
ca98e1c3f0434fa0171abf38aa11166f22c11ec2042edbfc136575f540da463f
-
SHA512
8737dcb973571a06ee8706ca6de9f61bfbb321c51f706aa8ddf1b179b3aee4bca62b7042960af40ca8cf8f57f61a9bfb06510c9e623a51d9a1aa4f3964d30257
-
SSDEEP
12288:BfoEIyN58FKzJleFLdeAjBFWaY9eH5xrjwHbCEf82YvXIDPttd:BfoEIyN58FK9lM4A9FWKnH0b582mX4Vt
Malware Config
Signatures
Files
-
ca98e1c3f0434fa0171abf38aa11166f22c11ec2042edbfc136575f540da463f.exe windows x86
33fa7e83794068c3a3bf0990a3362ef7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadModule
_lwrite
MoveFileA
WideCharToMultiByte
ProcessIdToSessionId
CreateIoCompletionPort
IsValidLanguageGroup
FindFirstFileA
WriteProfileSectionW
FatalAppExitA
CreateEventW
GetCompressedFileSizeA
GetTimeFormatW
CallNamedPipeA
CompareFileTime
GetLogicalDriveStringsA
GetThreadPriorityBoost
CreateEventA
GetCurrentDirectoryA
FreeLibraryAndExitThread
GetVolumeNameForVolumeMountPointA
CreateNamedPipeA
WriteProfileSectionA
GetCurrencyFormatA
GetThreadLocale
CreateDirectoryW
FatalExit
lstrcpyA
SetCurrentDirectoryA
GetProcessWorkingSetSize
GetCommMask
GetProcessHeaps
GetCurrentProcessId
GlobalHandle
IsBadHugeWritePtr
GetPrivateProfileSectionNamesW
CreateDirectoryExA
SetThreadLocale
GetLongPathNameW
OpenFileMappingA
LockFile
GetVolumeInformationW
GetVersionExA
PrepareTape
ReadFileScatter
PeekNamedPipe
GetFileAttributesW
WaitForDebugEvent
EnumDateFormatsExA
SetTimeZoneInformation
SearchPathA
GetCommTimeouts
GetQueuedCompletionStatus
SetFileApisToANSI
GetBinaryTypeA
CreateTimerQueue
UnmapViewOfFile
TlsAlloc
DeleteVolumeMountPointA
GetSystemWindowsDirectoryW
ExpandEnvironmentStringsW
GlobalAddAtomW
GetFileSize
SystemTimeToTzSpecificLocalTime
EnumResourceLanguagesW
IsValidCodePage
FindResourceExW
FindNextChangeNotification
SetEnvironmentVariableW
GlobalGetAtomNameW
SetHandleCount
DosDateTimeToFileTime
WaitForSingleObjectEx
lstrcpynW
LockResource
EnumLanguageGroupLocalesW
BackupSeek
GetPrivateProfileSectionW
RtlUnwind
GetFullPathNameA
DeviceIoControl
GetFileAttributesA
GetTempPathW
CompareStringW
EnumResourceLanguagesA
RemoveDirectoryW
FreeUserPhysicalPages
FreeEnvironmentStringsA
GetProcessVersion
GetSystemTimeAdjustment
GetDateFormatW
CreateMailslotA
QueueUserWorkItem
SizeofResource
SetVolumeMountPointW
lstrcpynA
GetShortPathNameA
GetCurrencyFormatW
FreeLibrary
FindFirstVolumeMountPointA
Process32NextW
GetStdHandle
SetupComm
GetNamedPipeHandleStateA
SetMailslotInfo
GetDevicePowerState
CreateFileA
EndUpdateResourceA
GetVersionExW
CreateFileMappingA
GetEnvironmentVariableW
ContinueDebugEvent
GetPriorityClass
GetLogicalDrives
GetSystemDefaultLCID
FreeEnvironmentStringsW
ReplaceFileA
GetSystemTimeAsFileTime
CreateJobObjectW
_llseek
shlwapi
PathAppendA
user32
DestroyAcceleratorTable
DialogBoxIndirectParamA
GetWindowWord
VkKeyScanExA
DrawCaption
EqualRect
EnumThreadWindows
CloseWindowStation
CreateCursor
BeginPaint
DragObject
GetNextDlgGroupItem
EnumPropsW
CharNextExA
ExcludeUpdateRgn
OemKeyScan
LoadAcceleratorsW
DefMDIChildProcA
CreateDesktopA
GetClipCursor
SystemParametersInfoA
WaitMessage
DrawStateW
GetProcessDefaultLayout
DdeUninitialize
DrawFrame
GetMessageExtraInfo
Sections
.text Size: 199KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 225KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ