Static task
static1
Behavioral task
behavioral1
Sample
c4102c629d52664b79f8d41b3d27a72c7e3a3f7142a5f28d63318752839349d4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c4102c629d52664b79f8d41b3d27a72c7e3a3f7142a5f28d63318752839349d4.exe
Resource
win10v2004-20220812-en
General
-
Target
c4102c629d52664b79f8d41b3d27a72c7e3a3f7142a5f28d63318752839349d4
-
Size
290KB
-
MD5
92c04cbce679ecae5fd0aa871ba08160
-
SHA1
5a121cf52d4bdf05d114a49f7e02ed09cfc55b48
-
SHA256
c4102c629d52664b79f8d41b3d27a72c7e3a3f7142a5f28d63318752839349d4
-
SHA512
3136e187ea605805b4b62b456540b1d59e65cc29d20a047d9ca3be5b493f328c5a5ce9aff22af98ef5bddf556b2181ecd07245072cd55e2abe925daca9e9feb1
-
SSDEEP
6144:NC/4OMTe7dShZ2zIcEBx38ksQhznwyDWRQXBP0XJlT8YA:MMTeAkzIcq3ORQXBkp8Y
Malware Config
Signatures
Files
-
c4102c629d52664b79f8d41b3d27a72c7e3a3f7142a5f28d63318752839349d4.exe windows x86
f9fb80cafbdb18f1d0f9548f4a719e74
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
QueryInformationJobObject
EnumSystemLanguageGroupsA
SetThreadExecutionState
GetFileTime
FindNextVolumeA
CompareStringA
DnsHostnameToComputerNameW
GetTimeZoneInformation
ResetEvent
Process32NextW
DefineDosDeviceW
GetFileType
GetNumberFormatA
CreateDirectoryW
ConvertDefaultLocale
EndUpdateResourceA
QueryPerformanceCounter
WritePrivateProfileStringW
SetNamedPipeHandleState
GetSystemDefaultUILanguage
SetVolumeMountPointA
FormatMessageA
SetFileApisToOEM
GetPrivateProfileStringA
GetProcessVersion
user32
EnableWindow
GetDCEx
ClientToScreen
Sections
.text Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 959B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ