Static task
static1
Behavioral task
behavioral1
Sample
1c26f513c95125caa5af7109a030f5932ae2637c1e793f26bc8fea4f7b08a50a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c26f513c95125caa5af7109a030f5932ae2637c1e793f26bc8fea4f7b08a50a.exe
Resource
win10v2004-20220812-en
General
-
Target
1c26f513c95125caa5af7109a030f5932ae2637c1e793f26bc8fea4f7b08a50a
-
Size
113KB
-
MD5
84a11d788ac2d9da6d81810308a05f55
-
SHA1
c86bbcb5956ecb4366f734a9b358d18932c8bb4a
-
SHA256
1c26f513c95125caa5af7109a030f5932ae2637c1e793f26bc8fea4f7b08a50a
-
SHA512
5153f13b4c8eb337a89ffd6ead11a9a56170a5d8b51eb6368ab033c10f146dcc066fa2fbe3e39c27d9d0623774102538f83f785581ba3c8ed552c2d47b3a522e
-
SSDEEP
1536:hrAxgogaXoCPrZmTOwXZnhCIh9GeCFhBUUqoQUmVwKCe/LiwKCeW:hrvTa4CDMxpMIHxOU7oQUmVwI/LiwIW
Malware Config
Signatures
Files
-
1c26f513c95125caa5af7109a030f5932ae2637c1e793f26bc8fea4f7b08a50a.exe windows x86
8e51f6859ac6c397dfe940fd5fb30fc1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
WinExec
TerminateProcess
OutputDebugStringA
CreateThread
QueryDosDeviceA
GetLogicalDriveStringsA
Sleep
GetPrivateProfileStringA
FindClose
lstrlenA
OpenMutexA
WaitForSingleObject
CreateProcessA
WriteFile
SizeofResource
LoadResource
FindResourceA
CreateFileA
ReleaseMutex
CreateMutexA
DeleteFileA
GetCurrentProcessId
UnmapViewOfFile
GetFileSize
MapViewOfFile
CreateFileMappingA
ExitProcess
SetUnhandledExceptionFilter
TerminateThread
GetPrivateProfileIntA
GetLocalTime
GetCurrentThreadId
lstrcatA
lstrcpyA
SetThreadPriority
GetCurrentThread
ReadFile
SetFilePointer
SetFileAttributesA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GlobalMemoryStatus
CreateProcessW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
IsBadReadPtr
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetFileType
FindFirstFileA
GetCurrentProcess
OpenProcess
GetLastError
GetCommandLineA
GetVersion
ReadProcessMemory
GetProcAddress
CloseHandle
LoadLibraryA
WritePrivateProfileStringA
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
RaiseException
GetStartupInfoA
GetModuleHandleA
GetSystemTime
GetTimeZoneInformation
HeapAlloc
HeapFree
RtlUnwind
LocalFree
MultiByteToWideChar
WideCharToMultiByte
user32
wsprintfA
SendMessageA
FindWindowExA
PostMessageA
MessageBoxA
SetThreadDesktop
IsWindow
wsprintfW
CreateDesktopA
GetThreadDesktop
FindWindowA
advapi32
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegOpenKeyA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHGetPathFromIDListA
SHChangeNotify
SHGetSpecialFolderLocation
ole32
CoUninitialize
OleRun
CoInitialize
CoCreateInstance
oleaut32
VariantClear
GetErrorInfo
SysAllocString
SysFreeString
VariantCopy
VariantInit
psapi
EnumProcesses
GetModuleFileNameExA
shlwapi
SHDeleteKeyA
PathFindFileNameA
PathRemoveExtensionA
SHDeleteValueA
PathRemoveFileSpecA
netapi32
Netbios
wininet
InternetConnectA
InternetOpenA
HttpOpenRequestA
HttpSendRequestA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ