Static task
static1
Behavioral task
behavioral1
Sample
0c99641beb134dcf475aaae212d7b5efff3179801171e36ba1bf4d0fd72954bd.exe
Resource
win7-20220812-en
General
-
Target
0c99641beb134dcf475aaae212d7b5efff3179801171e36ba1bf4d0fd72954bd
-
Size
240KB
-
MD5
93659cecf121db78b5bf4e4447189e30
-
SHA1
1ee3ddb7255ad0b3241ff603d23eab44da903128
-
SHA256
0c99641beb134dcf475aaae212d7b5efff3179801171e36ba1bf4d0fd72954bd
-
SHA512
3b4fd5e6a97537724ab2ab6114b84b056953fdc6f2eb653a881d7bcae5756855d3b2e744f362921aefb40233942aae1f7142cd0e2aad112953c1e2695d8b99dd
-
SSDEEP
6144:UQ/qeUEeG40zNONP0pqc6H13wT66vlmpDVc6SgwRgJc3yIbI9:cej40EBZc6SgwRgYY9
Malware Config
Signatures
Files
-
0c99641beb134dcf475aaae212d7b5efff3179801171e36ba1bf4d0fd72954bd.exe windows x86
726cb7ffccfcd0b8ad984f41d192fcdd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
comctl32
InitCommonControls
kernel32
AllocConsole
AreFileApisANSI
CloseHandle
CreateDirectoryA
CreateFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
GetConsoleTitleA
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentStrings
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetTempFileNameA
GetTempPathA
GetTickCount
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MultiByteToWideChar
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
SearchPathA
SetConsoleTitleA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
msvcrt
_close
_fileno
_fstat
_isatty
_lseek
_open
_read
_stricmp
_wcslwr
_write
_HUGE
__getmainargs
__mb_cur_max
__p__environ
__set_app_type
_assert
_cexit
_errno
_fileno
_fmode
_fpreset
_iob
_isctype
_mkdir
_pctype
_putenv
_rmdir
_setmode
_strupr
_tempnam
abort
atexit
atoi
ctime
difftime
exit
fclose
fflush
fgets
fopen
fprintf
fread
free
fseek
fwprintf
fwrite
getc
getenv
malloc
memchr
memcpy
memmove
memset
mktime
printf
rand
remove
signal
sprintf
srand
strcat
strchr
strcmp
strcpy
strncmp
strncpy
strrchr
strstr
strtok
strtol
strtoul
swprintf
time
vfprintf
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
shell32
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
user32
DispatchMessageA
EnumWindows
ExitWindowsEx
FindWindowA
GetLastActivePopup
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
IsIconic
IsWindowVisible
MessageBoxA
MessageBoxW
SetForegroundWindow
ShowWindow
TranslateMessage
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 49KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE