Static task
static1
Behavioral task
behavioral1
Sample
c4de77d7562932f09b6a83fc7e3111261e07b94e613445c67d2a2d16580e13aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4de77d7562932f09b6a83fc7e3111261e07b94e613445c67d2a2d16580e13aa.exe
Resource
win10v2004-20220901-en
General
-
Target
c4de77d7562932f09b6a83fc7e3111261e07b94e613445c67d2a2d16580e13aa
-
Size
724KB
-
MD5
82689db6094478c341f42abfd2f1805a
-
SHA1
ea8252cb6a3443f3ceb31bedb4686fdd04d3083b
-
SHA256
c4de77d7562932f09b6a83fc7e3111261e07b94e613445c67d2a2d16580e13aa
-
SHA512
f5c6b319f471cf0f7731eb6c0c57e9cd395cd68b86633c167abd7f1e9572d15867c1da061abde3938771ec2d6690d7f05f9d773a92153f89fab43347bd2f3f11
-
SSDEEP
12288:MqTyAB/qUgquaGRo02K/Hsb/0pmrNyTXe6x1ttkVCk/JaNwnLHpic+x9DAelFg:MNo7m9c/qqN2Hx1t/A7LHcc+xbFg
Malware Config
Signatures
Files
-
c4de77d7562932f09b6a83fc7e3111261e07b94e613445c67d2a2d16580e13aa.exe windows x86
e986af5f205df13ce7e41f9372b65b56
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowWindow
CreateWindowExW
RegisterClassW
DestroyWindow
DefWindowProcW
RegisterClassExW
MessageBoxW
ole32
OleInitialize
RevokeDragDrop
CoTaskMemFree
ReleaseStgMedium
CoFreeUnusedLibraries
OleFlushClipboard
CoTaskMemAlloc
CoUninitialize
OleDuplicateData
comdlg32
PrintDlgA
CommDlgExtendedError
kernel32
InitializeCriticalSectionAndSpinCount
GetOEMCP
RtlUnwind
GetModuleHandleW
ExitProcess
TlsAlloc
FlushFileBuffers
SetUnhandledExceptionFilter
GetCPInfo
GetModuleFileNameA
HeapSize
GetCurrentProcess
TlsSetValue
GetStringTypeA
LocalFree
LCMapStringW
VirtualAlloc
WideCharToMultiByte
GetTimeZoneInformation
GetStringTypeW
HeapFree
CompareStringW
GetStdHandle
HeapDestroy
WriteConsoleA
WaitForSingleObject
MultiByteToWideChar
GetUserDefaultLCID
GetConsoleCP
GetModuleFileNameW
SetConsoleCtrlHandler
SetStdHandle
IsValidCodePage
GetLocaleInfoA
LCMapStringA
FatalAppExitA
GetCurrentProcessId
GetCurrentThreadId
CreateMutexW
Sleep
WriteFile
HeapAlloc
GetStartupInfoA
HeapReAlloc
GetModuleHandleA
SetHandleCount
QueryPerformanceCounter
CreateFileA
LoadLibraryA
TlsFree
GetFileType
CompareStringA
WriteConsoleW
GetTickCount
TlsGetValue
SetEnvironmentVariableA
GetCurrentThread
VirtualQuery
VirtualFree
IsDebuggerPresent
EnterCriticalSection
UnhandledExceptionFilter
GetConsoleMode
ReadFile
GetTimeFormatA
TerminateProcess
GetCommandLineW
HeapCreate
GetProcAddress
GetDateFormatA
GetLastError
CloseHandle
GetEnvironmentStringsW
GetConsoleOutputCP
InterlockedExchange
SetFilePointer
IsValidLocale
SetLastError
InterlockedDecrement
FreeEnvironmentStringsW
DeleteCriticalSection
GetStartupInfoW
GetSystemTimeAsFileTime
LeaveCriticalSection
GetACP
InterlockedIncrement
FreeLibrary
GetLocaleInfoW
mfc42
ord1576
shell32
ShellExecuteA
ord155
SHBrowseForFolderA
Shell_NotifyIconA
ExtractIconA
SHGetPathFromIDListA
SHGetFileInfoA
advapi32
SetSecurityDescriptorDacl
OpenThreadToken
RegOpenKeyExA
FreeSid
InitializeAcl
OpenProcessToken
SetSecurityDescriptorOwner
RegQueryValueExA
SetSecurityDescriptorGroup
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ